jonticknor / ElasticPhishLinks
Proof-of-concept for phishing intelligence in Elastic
☆15Updated 6 years ago
Alternatives and similar repositories for ElasticPhish
Users that are interested in ElasticPhish are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- ☆24Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- ☆12Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- certstream + analytics☆11Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- ☆14Updated 7 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- parsers to make life easier☆13Updated 4 years ago