duo-labs / lookalike-domainsLinks
generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)
☆32Updated last year
Alternatives and similar repositories for lookalike-domains
Users that are interested in lookalike-domains are comparing it to the libraries listed below
Sorting:
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- A low/zero interaction ssh authentication logging honeypot☆22Updated 11 months ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Packer.io Scripts to build the SIFT VM(s)☆11Updated 4 years ago
- Domain name permutation as a service☆62Updated 4 months ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- 1-Click push forensics evidence to the cloud☆141Updated last year
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆50Updated 7 years ago
- Vendor Security Model Contract☆98Updated 3 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 5 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆52Updated 5 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- Tools to assist in forensicating docker☆84Updated 4 months ago
- first commit☆20Updated last year
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- CLI tool which uses URLScan to scan websites and download corresponding screenshots and DOMs.☆38Updated last year
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated 2 years ago
- A list of OPML Security Feeds☆74Updated 3 months ago
- Misc Tools for Virus Total Interaction☆35Updated 7 years ago