f8al / DNSrazzleLinks
A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation
☆41Updated 6 months ago
Alternatives and similar repositories for DNSrazzle
Users that are interested in DNSrazzle are comparing it to the libraries listed below
Sorting:
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- ☆120Updated last month
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Website crawler with YARA detection☆90Updated 2 years ago
- Yara scan Phishing Kit's Zip archive(s)☆62Updated 5 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- ☆44Updated 4 months ago
- Collection of useful Canary tools☆92Updated 2 weeks ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- URL fingerprinting made easy☆90Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last month
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆106Updated last month
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Updated last year
- A collection of tips for using MISP.☆75Updated 11 months ago
- Website for ail-typo-squatting library☆66Updated 2 months ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- ☆69Updated 4 years ago
- A browser extension and API server for detecting corporate password use on external websites☆94Updated 2 months ago