catching-transparent-phish / phocaLinks
Tool to analyze and detect MITM phishing toolkits on the web.
☆81Updated 3 years ago
Alternatives and similar repositories for phoca
Users that are interested in phoca are comparing it to the libraries listed below
Sorting:
- Data visualization for blue teams☆126Updated 2 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated last year
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆140Updated 2 years ago
- Open Threat Hunting Framework☆117Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- A tool designed to hunt for Phishing Kit source code☆223Updated 2 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆167Updated 2 years ago
- Blueteam operational triage registry hunting/forensic tool.☆148Updated 2 years ago
- A list of RMMs designed to be used in automation to build alerts☆111Updated 3 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆204Updated 2 years ago
- Active C2 IoCs☆99Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆263Updated last year
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- A home for detection content developed by the delivr.to team☆69Updated last month
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 2 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Active C&C Detector☆155Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 3 months ago
- A browser extension and API server for detecting corporate password use on external websites☆94Updated 7 months ago
- ☆96Updated 2 months ago
- Carbon Black TAU Excel 4 Macro Analysis☆43Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆99Updated 6 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 5 months ago
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆96Updated 2 years ago