dfirsec / check_repLinks
Check IP or Domain reputation against open-source Blacklists.
☆68Updated last year
Alternatives and similar repositories for check_rep
Users that are interested in check_rep are comparing it to the libraries listed below
Sorting:
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated 2 months ago
- A repository for possible zgrab2 configurations☆26Updated 2 years ago
- Domain name permutation as a service☆62Updated 3 months ago
- Yet another way to find where to report an abuse☆32Updated 5 months ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆51Updated 5 months ago
- Really can protect from ransomware encryption?☆46Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- Windows Security Logging☆43Updated 2 years ago
- ☆43Updated 2 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 months ago
- Ransomware Simulator for Red/Blue teams to test their defences.☆19Updated 3 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Public IoCs about log4j CVE-2021-44228☆9Updated 3 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 9 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 5 months ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 10 months ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated 2 years ago
- URL fingerprinting made easy☆86Updated last year
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆37Updated 2 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- ☆42Updated last year
- Source code used at TweetFeed.live☆42Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- A go-exploit to scan for implanted Cisco IOS XE Systems☆42Updated 8 months ago
- A home for detection content developed by the delivr.to team☆69Updated 3 weeks ago
- AIL project training materials☆31Updated last month