hazcod / dnstwist
A tool to monitor for potential spear phishing domains and send to Slack.
☆22Updated 11 months ago
Alternatives and similar repositories for dnstwist:
Users that are interested in dnstwist are comparing it to the libraries listed below
- Virtual Security Operations Center☆50Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- ☆41Updated 9 months ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆32Updated last month
- ☆17Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 9 months ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆63Updated this week
- Sigma detection rules for hunting with the threathunting-keywords project☆52Updated this week
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆37Updated 10 months ago
- Slides and materials for conference presentations☆11Updated last year
- Helpful tools for interacting with a GoPhish phishing instance☆42Updated 4 months ago
- ☆21Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated 2 months ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Stupid Simple Detection Testing☆12Updated 10 months ago
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Sniffing out well-known threat groups☆28Updated 5 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆39Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated 2 weeks ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Windows Security Logging☆43Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- ☆14Updated 4 years ago