Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also checks if any domain changes with that keyword look like a phishing domain.
☆10Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for blackcert
Users that are interested in blackcert are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- personal fork of OSINT tool recon-ng☆16Dec 17, 2017Updated 8 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Mar 16, 2026Updated last week
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Oct 29, 2020Updated 5 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- Identity Server that supports SCIM, LDAP, SAMLv2 and OpenIDConnect☆11Oct 5, 2022Updated 3 years ago
- Hello Deep Learning☆16Apr 20, 2024Updated last year
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Sep 27, 2022Updated 3 years ago
- Command line application to update popular third party software on Windows operating systems easily☆16Updated this week
- FOSS implementation of the NINA app☆11Feb 1, 2022Updated 4 years ago
- Amazing open source projects made in Uzbekistan 🇺🇿☆25May 17, 2023Updated 2 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- IMAP or SMTP honeypot written in Golang☆26Apr 22, 2022Updated 3 years ago
- Tools to Obtain and Work with Cloud Provider CIDR Blocks in R☆18Sep 28, 2018Updated 7 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Jul 31, 2022Updated 3 years ago
- Python library for managing Arbor Peakflow SP.☆20May 26, 2016Updated 9 years ago
- A Splunk app that will rotate between dashboards on a frequency; useful for displaying content on informational big screens.☆13Mar 9, 2022Updated 4 years ago
- Tool to grab version information of selected software packages☆13May 22, 2023Updated 2 years ago
- An Ansible Role that installs and configures Snowflake proxy on GNU/Linux and FreeBSD☆15Updated this week
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- ML Toolkit & Showcase application documents☆14May 23, 2016Updated 9 years ago
- Scripts for making Hubot a CND Sidekick☆59Apr 14, 2016Updated 9 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 5 years ago
- Gallery☆13Mar 29, 2019Updated 6 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- XMPP bot that sends messages from the NINA app☆15Jan 12, 2026Updated 2 months ago
- ☆14Jul 8, 2016Updated 9 years ago
- This is a demo of a TCP hijacking (telnet) using Mininet and Ettercap.☆12Sep 24, 2015Updated 10 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 9 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Go CSV reader like Python's DictReader☆24Aug 28, 2025Updated 6 months ago
- Modern Honey Network App for Splunk☆50Sep 30, 2019Updated 6 years ago
- Fastly WAF CLI☆27Oct 11, 2023Updated 2 years ago
- Allows for MAC address to vendor mapping in Splunk☆16Sep 22, 2023Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- ☆12Apr 21, 2019Updated 6 years ago