duggytuxy / Intelligence_DNS_Blocklist
Intelligence DNS Blocklist : Phishing, Scam, Malicious DN, Malware Delivery
☆30Updated this week
Alternatives and similar repositories for Intelligence_DNS_Blocklist
Users that are interested in Intelligence_DNS_Blocklist are comparing it to the libraries listed below
Sorting:
- Speed up your pentest enumeration☆83Updated last week
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆28Updated 2 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated 2 years ago
- Identify the accounts most vulnerable to dictionary attacks☆119Updated last month
- HookPhish is a Python script designed to aid in the detection of phishing websites☆37Updated last year
- SwitchToOpen - The open source shift☆53Updated last week
- ☆12Updated 3 months ago
- GLPI vulnerabilities checking tool☆114Updated last month
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆19Updated 4 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆146Updated this week
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 7 months ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆101Updated last month
- ☆54Updated 3 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆39Updated 3 months ago
- Intelligence Blocklist (IPv4). DST = France & Belgium☆257Updated this week
- DFIR ORC PARSER PROJECT☆25Updated 2 months ago
- AzureKitty is an Office 365 and Azure configuration audit tool☆14Updated last year
- ☆37Updated 6 months ago
- Protect your data in minutes !☆118Updated 6 months ago
- Make your keepass 2.x more secure.☆59Updated 10 months ago
- ☆160Updated 7 months ago
- ☆55Updated 11 months ago
- A tool for mapping cyber crime☆139Updated last month
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆259Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆73Updated 3 weeks ago
- répertoire de publication web public☆44Updated 10 months ago
- Command Line Sock Puppet Creator for Investigators.☆75Updated last month
- AI-Powered Dark Web OSINT Tool☆66Updated 2 weeks ago
- NetProbe: Network Probe☆156Updated 7 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆142Updated this week