eschultze / phishstats-api-network
Visualize networks of phishing by querying the phishstats.info API
☆78Updated 6 months ago
Alternatives and similar repositories for phishstats-api-network:
Users that are interested in phishstats-api-network are comparing it to the libraries listed below
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 8 months ago
- Python wrapper for urlscan.io's API☆102Updated 3 years ago
- Yara scan Phishing Kit's Zip archive(s)☆56Updated 11 months ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- URL fingerprinting made easy☆86Updated 10 months ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆56Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 2 years ago
- Ransomware groups posts☆38Updated this week
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆48Updated 2 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated last year
- Python3 interface for the EmailRep API☆51Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated last month
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆91Updated 2 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated 2 years ago
- Sniffing out well-known threat groups☆28Updated 6 months ago
- Maintained list of OSINT resources specifically for researching domains and IoT products.☆67Updated 3 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆22Updated 2 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆112Updated 3 years ago
- ☆34Updated last month
- recon-ng modules for Censys☆37Updated last year
- automated password spraying tool☆147Updated 3 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆37Updated 8 months ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆162Updated this week
- Fraud prevention tool☆28Updated 4 years ago