endgameinc / homoglyph
☆30Updated 6 years ago
Alternatives and similar repositories for homoglyph
Users that are interested in homoglyph are comparing it to the libraries listed below
Sorting:
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Notebook collection☆10Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Splunk integration with MISP☆12Updated 7 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- Python bindings for Yeti's API☆18Updated last year
- Providing timelines based on OSINT Reports☆32Updated last year
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- SANS Hunting on the Cheap☆35Updated 9 years ago
- My notes on various topics☆64Updated last year
- Opening CobaltStrike to a wider world☆8Updated 7 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated 2 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- ☆19Updated 6 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- ☆14Updated 6 years ago
- ☆50Updated 6 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 4 years ago