andpalmier / seads
Search Engines ADs scanner - spotting malvertising in search engines has never been easier!
☆35Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for seads
- C2 Active Scanner☆47Updated 4 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated this week
- Cyber Underground General Intelligence Requirements☆90Updated 9 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- Sniffing out well-known threat groups☆28Updated 2 months ago
- Can you pay the ransom in your country?☆13Updated 10 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆48Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆96Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆26Updated this week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 3 months ago
- ☆19Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆25Updated 3 weeks ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆50Updated 2 weeks ago
- ☆43Updated 6 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆29Updated 3 weeks ago
- a common schema for internet-connected service discovery 🔎 📚☆19Updated 11 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆39Updated 10 months ago
- A home for detection content developed by the delivr.to team☆59Updated 2 months ago
- A collection of CVEs weaponized by ransomware operators☆51Updated this week
- Data from Dark Web Marketplace scraping - Be careful☆34Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 9 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆62Updated 9 months ago
- An open source platform to support analysts to organise their case and tasks☆55Updated last week
- Yet another way to find where to report an abuse☆31Updated 4 months ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆43Updated 2 years ago
- Ransomware groups posts☆34Updated this week
- Virus Total Free - IOC parser and report generator☆22Updated last year
- Detection Engineering with YARA☆85Updated 10 months ago