covert-labs / mx-intel
Jupyter Notebooks and code used for DNS MX mining to identify top email security providers
☆54Updated last year
Alternatives and similar repositories for mx-intel:
Users that are interested in mx-intel are comparing it to the libraries listed below
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Website crawler with YARA detection☆88Updated last year
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- Universal Honey Pot☆31Updated 2 years ago
- Virustotal Data to Timesketch☆17Updated 5 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Updated 3 years ago
- Data related to the SANS Internet Storm Center☆11Updated 5 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆30Updated last year
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- ☆24Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆57Updated last year
- ☆41Updated 10 months ago
- For storing of the volumes☆4Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- repo for sharing stuff☆16Updated last year
- ☆18Updated 3 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- CSIRT Jump Bag☆27Updated 9 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Triage automation for suspect URLs☆12Updated 5 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆86Updated this week