a common schema for internet-connected service discovery π π
β23Jan 29, 2026Updated last month
Alternatives and similar repositories for transl8
Users that are interested in transl8 are comparing it to the libraries listed below
Sorting:
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Trackerβ12Nov 5, 2024Updated last year
- reveal origins behind reverse proxies & hidden services π π§ π»β37Aug 23, 2025Updated 6 months ago
- β16Apr 21, 2023Updated 2 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.β22Apr 17, 2024Updated last year
- β27Nov 26, 2024Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β62Jul 18, 2024Updated last year
- Automatically spin up infra for phishingβ64Feb 1, 2020Updated 6 years ago
- Hacks through Khan Academy lessonsβ14Dec 27, 2023Updated 2 years ago
- URL fingerprinting made easyβ89Apr 13, 2024Updated last year
- Incident Notification Platform by @NC3-LUβ11Updated this week
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed dataβ10Mar 14, 2023Updated 2 years ago
- Olympic Games dashboard for the "Build-a-Dashboard" workshop at posit::conf(2024)β12Aug 13, 2024Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains β¦β10Oct 17, 2023Updated 2 years ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CDβ10Nov 7, 2023Updated 2 years ago
- β12Oct 1, 2021Updated 4 years ago
- Sigma Queries turned into KQL for Defender using pysigmaβ12Jun 20, 2024Updated last year
- Detection rule validationβ40Oct 25, 2023Updated 2 years ago
- A collection of tools and schemas in Rust to analyze data on IPFS and BitSwap traces.β10Dec 3, 2025Updated 3 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tacticsβ189Apr 24, 2025Updated 10 months ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.β12Jun 9, 2025Updated 8 months ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.β11Jan 16, 2026Updated last month
- Simple example of using binary websocket messages within Phoenixβ13Feb 26, 2021Updated 5 years ago
- A filter cascade implementation in rustβ15Apr 5, 2023Updated 2 years ago
- import library.zip in memory, with the interface the same as zipimport.β10Jan 10, 2026Updated last month
- One file based map demo