andpalmier / seads
Search Engines ADs scanner - spotting malvertising in search engines has never been easier!
☆35Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for seads
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated this week
- C2 Active Scanner☆49Updated 5 months ago
- Can you pay the ransom in your country?☆14Updated 11 months ago
- Cyber Underground General Intelligence Requirements☆89Updated 9 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆59Updated 3 weeks ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 4 months ago
- Sniffing out well-known threat groups☆28Updated 3 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Detection rule validation☆41Updated last year
- ☆83Updated 3 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆35Updated 10 months ago
- ☆26Updated this week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated last month
- A series of python scripts to extract information from Dark Web Applications☆12Updated last week
- ☆19Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆98Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆39Updated 10 months ago
- A MITRE ATT&CK Lookup Tool☆44Updated 6 months ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆25Updated last year
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆30Updated 3 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Data from Dark Web Marketplace scraping - Be careful☆35Updated 3 weeks ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated 10 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- A tool for studying JavaScript malware.☆14Updated this week
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago