jonticknor / ElasticPhishLinks
Proof-of-concept for phishing intelligence in Elastic
☆15Updated 6 years ago
Alternatives and similar repositories for ElasticPhish
Users that are interested in ElasticPhish are comparing it to the libraries listed below
Sorting:
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆24Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- ☆22Updated 5 years ago
- Triage automation for suspect URLs☆13Updated 6 years ago
- Virustotal Data to Timesketch☆16Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- A Passive DNS backend and collector☆33Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 5 years ago
- HoneyDB Python Module☆14Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Useful commands for infosec☆28Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- ☆14Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- Old home of LimaCharlie, open source EDR☆32Updated 2 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 5 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago