covert-labs / mx-intelLinks
Jupyter Notebooks and code used for DNS MX mining to identify top email security providers
☆55Updated 2 years ago
Alternatives and similar repositories for mx-intel
Users that are interested in mx-intel are comparing it to the libraries listed below
Sorting:
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Website crawler with YARA detection☆89Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- C# User Simulation☆33Updated 2 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- Bluehat 2018 Graphs for Security Workshop☆42Updated 7 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- ☆25Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Updated 3 years ago