dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement domains that should be sinkholed/blocked.
☆18Apr 13, 2016Updated 9 years ago
Alternatives and similar repositories for dnssinkholelist
Users that are interested in dnssinkholelist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- malware-traffic-analysis.net PCAPs repository.☆37Jun 9, 2016Updated 9 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Yara rules☆49Jan 28, 2014Updated 12 years ago
- Malice Yara Plugin☆29Sep 8, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Yara syntax highlighting☆25Sep 4, 2021Updated 4 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- My Yara Rules Collection☆52Feb 7, 2016Updated 10 years ago
- A little flask app that streams logs from Elasticsearch to you. Loads faster than Kibana, controlled via query parameters.☆10Feb 26, 2026Updated last month
- CommunityHoneyNetwork Server☆40May 1, 2023Updated 2 years ago
- note without the e(vernote), the quickest dirtiest cli evernote client ever☆10Apr 30, 2016Updated 9 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆74Jun 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Ruby bindings for the yara file analysis and classification library☆27Aug 26, 2011Updated 14 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Detect credit card exposures with Bro☆15Nov 12, 2023Updated 2 years ago