dfirsec / check_rep
Check IP or Domain reputation against open-source Blacklists.
☆66Updated last year
Alternatives and similar repositories for check_rep:
Users that are interested in check_rep are comparing it to the libraries listed below
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated 2 months ago
- ☆41Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆49Updated last week
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Automatic detection engineering technical state compliance☆55Updated 8 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆60Updated last year
- Windows Security Logging☆43Updated 2 years ago
- AIL project training materials☆28Updated 2 months ago
- ☆19Updated 3 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆71Updated 4 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated 2 weeks ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Domain name permutation as a service☆62Updated 3 weeks ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 6 months ago
- ☆42Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Visualize networks of phishing by querying the phishstats.info API☆78Updated 7 months ago
- GCP cloud security CTF☆44Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 11 months ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆57Updated 11 months ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago