duo-labs / lookalike-domainsLinks
generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)
☆33Updated 2 years ago
Alternatives and similar repositories for lookalike-domains
Users that are interested in lookalike-domains are comparing it to the libraries listed below
Sorting:
- Best practices in threat intelligence☆48Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- Tools for AWS forensics☆64Updated 9 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- ☆48Updated 2 years ago
- Scripts to help work with configuration audit files☆89Updated 2 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- automate your MISP installs☆68Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- ☆120Updated 2 weeks ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
- ☆34Updated 4 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆42Updated 5 years ago
- Multithreaded threat Intelligence gathering built with Python3☆176Updated 7 years ago
- Files vetted, and approved for public release☆55Updated last year
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆148Updated 9 months ago
- ☆55Updated 4 years ago
- Domain name permutation as a service☆65Updated 8 months ago
- Controls Assessment Specification☆70Updated 7 months ago
- Vendor Security Model Contract☆98Updated 3 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆180Updated last year
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆113Updated 3 weeks ago
- Expert Investigation Guides☆51Updated 4 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆102Updated 5 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 2 years ago