ninoseki / abuse_whois
Yet another way to find where to report an abuse
☆32Updated last month
Alternatives and similar repositories for abuse_whois:
Users that are interested in abuse_whois are comparing it to the libraries listed below
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated 2 months ago
- Yara scan Phishing Kit's Zip archive(s)☆57Updated 11 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- ☆24Updated 2 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- Website crawler with YARA detection☆88Updated last year
- Converting data from services like Censys and Shodan to a common data model☆49Updated 6 months ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆40Updated this week
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 5 months ago
- Collection of videos of Raids on Cybercriminals☆19Updated this week
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 9 months ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- URL fingerprinting made easy☆85Updated 11 months ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- For storing of the volumes☆4Updated 5 years ago
- Can you pay the ransom in your country?☆14Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- ☆15Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆27Updated 6 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- VirusTotal Intelligence Search☆35Updated 4 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated last month
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 2 months ago