A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive DNS server
☆19Sep 12, 2014Updated 11 years ago
Alternatives and similar repositories for DNSblacklist
Users that are interested in DNSblacklist are comparing it to the libraries listed below
Sorting:
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- From telegram bot in command line terminal☆20Oct 15, 2018Updated 7 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 25, 2026Updated last week
- ☆15Jul 12, 2023Updated 2 years ago
- Kubernetes operator to integrate deployments inspired by Canonical Juju Charm Relations☆15Jan 24, 2024Updated 2 years ago
- Assembly - a hugo theme☆10Oct 2, 2018Updated 7 years ago
- PVLB: Patrick's Linux/Nginx/Haproxy Load balancer configuration☆11Oct 27, 2014Updated 11 years ago
- Source code of Serum official website☆11Jul 18, 2020Updated 5 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- black Ip lists, dorks-collection☆16Mar 1, 2026Updated last week
- ringzer0team challange solutions☆33Jan 15, 2016Updated 10 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Teach people to lock their computers when unattended. Set the Background of their device to an embarassing image randomly scraped from th…☆10Apr 19, 2023Updated 2 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- This software generates a Helm chart from the user's answers to a series of simple questions.☆28Mar 1, 2025Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Automation to configure and maintain PiKVM IP-KVMs☆13Jan 3, 2024Updated 2 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Go library for generating XOAuth2 strings (for use in XOAUTH2 SASL auth schemes for IMAP/SMTP)☆12Sep 17, 2012Updated 13 years ago
- A PoC of Go AES with a key protected in memory