ndscplnt / AbuseIPDB-Checker
Python script that use AbuseIPDB API to check IP reputation for threats. Supports both command line and GUI interfaces. Input options include single IP, subnet, or file. Generates detailed reports and is configurable via settings file
☆12Updated last month
Alternatives and similar repositories for AbuseIPDB-Checker
Users that are interested in AbuseIPDB-Checker are comparing it to the libraries listed below
Sorting:
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆72Updated last year
- Malicious IP source.☆93Updated this week
- Standard-Format Threat Intelligence Feeds☆112Updated this week
- Python Scanner for passing IP addresses and utilizing AbuseIPdb API to find bad IPs☆57Updated 5 months ago
- A configuration to allow Wazuh to communicate with ChatGPT, based on https://loggar.hashnode.dev/augmenting-wazuh-with-chatgpt-integratio…☆21Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 7 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆86Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆156Updated 6 months ago
- A list of malicious IP addresses associated with botnets, cyberattacks, and the generation of artificial traffic on websites. Useful for …☆22Updated this week
- Indicators of Compromise☆195Updated last week
- ☆74Updated last week
- MISP to Sentinel integration☆67Updated last month
- Tools for simulating threats☆183Updated last year
- SentinelOne STAR Rules☆60Updated 3 months ago
- Zeek-Formatted Threat Intelligence Feeds☆361Updated this week
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆52Updated 2 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆17Updated 2 months ago
- ☆13Updated 2 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆301Updated this week
- A production ready Dockered MISP☆233Updated this week
- ☆69Updated last month
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆95Updated 4 months ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆85Updated 4 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆257Updated last year
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆247Updated last month
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 3 weeks ago