josehelps / blackcertLinks
Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also checks if any domain changes with that keyword look like a phishing domain.
☆10Updated 3 years ago
Alternatives and similar repositories for blackcert
Users that are interested in blackcert are comparing it to the libraries listed below
Sorting:
- A collection of typical false positive indicators☆55Updated 5 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Triage automation for suspect URLs☆13Updated 6 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- Different tools, koen.vanimpe@cudeso.be☆136Updated 5 months ago
- automate your MISP installs☆68Updated 5 years ago
- Simple yara rule manager☆66Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆50Updated 3 weeks ago
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆62Updated 7 months ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 10 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- A rewrite of mactime, a bodyfile reader☆39Updated last year
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Volatility plugins developed and maintained by the community☆21Updated last year
- Universal Honey Pot☆29Updated 4 months ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- ☆39Updated 6 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- ☆37Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 2 years ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆102Updated 5 years ago
- ☆13Updated 6 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Updated 2 years ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Updated 7 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Updated last month