ninoseki / abuse_whoisLinks
Yet another way to find where to report an abuse
☆30Updated 10 months ago
Alternatives and similar repositories for abuse_whois
Users that are interested in abuse_whois are comparing it to the libraries listed below
Sorting:
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last month
- Yara scan Phishing Kit's Zip archive(s)☆62Updated 5 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- Website crawler with YARA detection☆90Updated 2 years ago
- ☆25Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 5 months ago
- URL fingerprinting made easy☆90Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 3 months ago
- Converting data from services like Censys and Shodan to a common data model☆51Updated 5 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- ☆15Updated 3 years ago
- Web Application for domain name monitoring / alerting☆65Updated last year
- TAPIR is a multi-user, client/server, incident response framework☆47Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- Fast lookup server for NSRL and other hash database used in digital forensic☆47Updated 3 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated last year
- Can you pay the ransom in your country?☆14Updated last year
- ☆28Updated 4 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆34Updated last week
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated 2 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 7 months ago