duo-labs / lookalike-domainsLinks
generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)
☆33Updated 2 years ago
Alternatives and similar repositories for lookalike-domains
Users that are interested in lookalike-domains are comparing it to the libraries listed below
Sorting:
- Tools for AWS forensics☆65Updated 9 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- ☆49Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Best practices in threat intelligence☆49Updated 3 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- This script is used to generate some basic detections of the aws security services☆72Updated 3 years ago
- automate your MISP installs☆68Updated 5 years ago
- 1-Click push forensics evidence to the cloud☆141Updated 2 months ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- ☆34Updated 4 years ago
- Python3 library and command line for GreyNoise☆172Updated 4 months ago
- Vendor Security Model Contract☆98Updated 3 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Updated last year
- Multithreaded threat Intelligence gathering built with Python3☆177Updated 7 years ago
- ☆120Updated last month
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆181Updated last year
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- Remote Memory Acquisition Tool☆251Updated 5 years ago
- Controls Assessment Specification☆70Updated 8 months ago