duo-labs / lookalike-domainsLinks
generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)
☆34Updated 2 years ago
Alternatives and similar repositories for lookalike-domains
Users that are interested in lookalike-domains are comparing it to the libraries listed below
Sorting:
- Tools for AWS forensics☆65Updated 9 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆52Updated 5 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 6 years ago
- Best practices in threat intelligence☆49Updated 3 years ago
- Files vetted, and approved for public release☆55Updated 2 years ago
- This script is used to generate some basic detections of the aws security services☆72Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- automate your MISP installs☆68Updated 5 years ago
- Scripts to help work with configuration audit files☆90Updated 2 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Updated 2 years ago
- 1-Click push forensics evidence to the cloud☆143Updated 3 months ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Materials used by Product Management and Product Marketing☆12Updated 7 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- Cyber Threat Intelligence Feeds☆69Updated last year
- ☆27Updated 12 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Updated 2 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆292Updated 2 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last week
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated 3 weeks ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago