ninoseki / abuse_whois
Yet another way to find where to report an abuse
☆31Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for abuse_whois
- Yara scan Phishing Kit's Zip archive(s)☆54Updated 7 months ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆43Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆54Updated 3 weeks ago
- Website crawler with YARA detection☆88Updated last year
- ☆24Updated 2 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 10 months ago
- Can you pay the ransom in your country?☆13Updated 10 months ago
- ☆15Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- Converting data from services like Censys and Shodan to a common data model☆48Updated 2 months ago
- ☆27Updated 6 years ago
- AIL project training materials☆23Updated last month
- Home to the ActorTrackr source code☆27Updated 7 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated last month
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 2 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 3 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 3 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆31Updated 2 weeks ago
- Setting up a training environment for MISP☆11Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Useful commands for infosec☆28Updated last year
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆33Updated 2 months ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆20Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- A database for storing, querying and doing stats on credential leaks☆37Updated last year