covert-labs / mx-intel
Jupyter Notebooks and code used for DNS MX mining to identify top email security providers
☆54Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mx-intel
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 8 months ago
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- Website crawler with YARA detection☆88Updated last year
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆44Updated last year
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- CSIRT Jump Bag☆27Updated 6 months ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆43Updated 2 years ago
- A collection of typical false positive indicators☆54Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- ☆40Updated 3 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆20Updated 2 years ago
- For storing of the volumes☆3Updated 4 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆84Updated this week
- A Python DNS crawler to find identical domain names under different TLDs.☆24Updated 5 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆23Updated 4 months ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Data related to the SANS Internet Storm Center☆11Updated 5 years ago
- TITO is a light framework for operationalizing threat intelligence that is platform and data agnostic.☆20Updated 4 years ago
- ☆24Updated 2 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Updated 2 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆69Updated 4 months ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆37Updated 4 months ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago