duo-labs / lookalike-domainsLinks
generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)
☆32Updated last year
Alternatives and similar repositories for lookalike-domains
Users that are interested in lookalike-domains are comparing it to the libraries listed below
Sorting:
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated 2 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Domain name permutation as a service☆62Updated 3 months ago
- automate your MISP installs☆68Updated 4 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- The FASTEST way to parse Email☆17Updated 3 years ago
- ☆18Updated 3 years ago
- ☆15Updated 5 years ago
- CLI tool which uses URLScan to scan websites and download corresponding screenshots and DOMs.☆38Updated last year
- Incident Response Playbooks☆14Updated 6 years ago
- For storing of the volumes☆4Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- Files vetted, and approved for public release☆53Updated last year
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆16Updated 4 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- ☆54Updated 4 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 8 months ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- Recon Hunt Queries☆77Updated 4 years ago
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Packer.io Scripts to build the SIFT VM(s)☆11Updated 4 years ago
- ☆46Updated 2 years ago