jonticknor / ElasticPhishView external linksLinks
Proof-of-concept for phishing intelligence in Elastic
☆15Apr 30, 2019Updated 6 years ago
Alternatives and similar repositories for ElasticPhish
Users that are interested in ElasticPhish are comparing it to the libraries listed below
Sorting:
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- Experimental DNS logs pipeline based on Pi-hole dnsmasq logs, ELK stack, and Filebeat. Sample configs included.☆29Oct 26, 2023Updated 2 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 5 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 5 months ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- Network exploit detection using highly accurate pre-trained deep neural networks with Celery + Keras + Tensorflow + Redis☆22Dec 7, 2018Updated 7 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆30Mar 22, 2023Updated 2 years ago
- Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys fil…☆18Aug 28, 2019Updated 6 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Feb 4, 2026Updated last week
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- ☆23Jun 11, 2024Updated last year
- A solution for using the ElastiFlow Unified Collector with the Elastic Stack (Elasticsearch and Kibana).☆25Nov 10, 2025Updated 3 months ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆32Sep 19, 2019Updated 6 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- Translate STIX 2 Patterning Queries☆31Oct 4, 2018Updated 7 years ago
- The FASTEST way to consume threat intel.☆69May 10, 2023Updated 2 years ago
- wallhack for cs:go game☆10Jul 7, 2024Updated last year
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Aug 19, 2020Updated 5 years ago
- Cyber Threat Intelligence Feeds☆70May 3, 2024Updated last year
- ☆37Apr 30, 2020Updated 5 years ago