gfek / Hunting-New-Registered-DomainsView external linksLinks
Hunting Newly Registered Domains
☆222Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Hunting-New-Registered-Domains
Users that are interested in Hunting-New-Registered-Domains are comparing it to the libraries listed below
Sorting:
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Phishing catcher using Certstream☆1,793Aug 13, 2024Updated last year
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆71Dec 8, 2022Updated 3 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,583Apr 15, 2025Updated 10 months ago
- An information security preparedness tool to do adversarial simulation.☆1,142Apr 1, 2019Updated 6 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- ☆59May 1, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,644Jun 6, 2024Updated last year
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆239Nov 8, 2019Updated 6 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- ☆399Jan 7, 2026Updated last month
- Your Everyday Threat Intelligence☆1,949Updated this week
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- A PowerShell script that aims to have a fully configured domain built in under 10 minutes, but also apply security configuration and hard…☆201Mar 27, 2021Updated 4 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆291Oct 28, 2017Updated 8 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated last year
- Issues to consider when planning a red team exercise.☆614Aug 23, 2017Updated 8 years ago
- ☆108Mar 21, 2017Updated 8 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆400Nov 12, 2019Updated 6 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 7 years ago
- Understanding ATT&CK Matrix for Enterprise☆79May 16, 2018Updated 7 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆177Jun 10, 2021Updated 4 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago