atenreiro / opensquat
The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonating legit domains and brands.
☆782Updated 9 months ago
Alternatives and similar repositories for opensquat:
Users that are interested in opensquat are comparing it to the libraries listed below
- A Holistic OSINT and Threat Hunting Platform☆524Updated 4 months ago
- ThePhish: an automated phishing email analysis tool☆1,217Updated 9 months ago
- A query aggregator for OSINT based threat hunting☆891Updated last week
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆916Updated 2 weeks ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆553Updated this week
- AIL framework - Analysis Information Leak framework☆726Updated last week
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆601Updated 2 years ago
- BlueHound - pinpoint the security issues that actually matter☆734Updated last year
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆691Updated 6 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆670Updated 6 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆672Updated 3 months ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆646Updated 2 years ago
- Purple Team Exercise Framework☆700Updated last year
- Ransomware leak site monitoring☆312Updated 3 years ago
- A tool designed to hunt for Phishing Kit source code☆222Updated 2 years ago
- Zeek-Formatted Threat Intelligence Feeds☆361Updated this week
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆321Updated 2 years ago
- Incident Response Methodologies 2022☆1,046Updated 3 weeks ago
- Extract and aggregate threat intelligence.☆863Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆650Updated last year
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- An application to analyze the EML file☆288Updated 3 weeks ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆256Updated last year
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆710Updated last month
- OWASP Honeypot, Automated Deception Framework.☆460Updated 7 months ago
- Yet another Ransomware gang tracker☆423Updated this week
- DFIRTrack - The Incident Response Tracking Application☆498Updated 8 months ago
- Exposing phishing kits seen from phishunt.io☆239Updated this week
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,393Updated 7 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆902Updated last year