alexandrosmagos / dyn-dns-list
This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes only and can be used for a variety of purposes, including blocking malicious domains, filtering content, and enhancing privacy and security.
☆82Updated this week
Related projects ⓘ
Alternatives and complementary repositories for dyn-dns-list
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆65Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆159Updated last week
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆66Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- ☆82Updated 2 months ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆98Updated 3 weeks ago
- A home for detection content developed by the delivr.to team☆59Updated 2 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated 3 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆50Updated 2 weeks ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆157Updated last year
- Cyber Underground General Intelligence Requirements☆90Updated 9 months ago
- C2 Active Scanner☆47Updated 4 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆144Updated last year
- Detection Engineering with YARA☆85Updated 10 months ago
- yara detection rules for hunting with the threathunting-keywords project☆83Updated this week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 3 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆30Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated 3 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆138Updated last month
- A list of RMMs designed to be used in automation to build alerts☆108Updated last week
- ☆26Updated this week
- Remote access and Antivirus Logging Database☆41Updated 6 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 2 months ago
- The Threat Actor Profile Guide for CTI Analysts☆96Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆62Updated 9 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆55Updated 2 months ago