jonticknor / ElasticPhishLinks
Proof-of-concept for phishing intelligence in Elastic
☆15Updated 6 years ago
Alternatives and similar repositories for ElasticPhish
Users that are interested in ElasticPhish are comparing it to the libraries listed below
Sorting:
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- ☆24Updated 3 years ago
- ☆22Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Triage automation for suspect URLs☆13Updated 6 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- HoneyDB Python Module☆14Updated last year
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- A Passive DNS backend and collector☆33Updated 3 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 5 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Updated 5 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 9 years ago
- Virustotal Data to Timesketch☆16Updated 6 years ago
- repo for sharing stuff☆17Updated 7 months ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year