Ayashige provides a list of suspicious newly updated domains as a JSON feed
☆38Jun 29, 2024Updated last year
Alternatives and similar repositories for ayashige
Users that are interested in ayashige are comparing it to the libraries listed below
Sorting:
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated last month
- An npm package to defang and refang IoC☆12Sep 7, 2025Updated 6 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- A toolkit for Security Researchers☆125Sep 2, 2019Updated 6 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- URL fingerprinting made easy☆89Apr 13, 2024Updated last year
- ☆33Updated this week
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- The undocumented API for reporting sites to Safe Browsing☆11Jun 3, 2020Updated 5 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- A python script to automate the use of dex2jar tool along with cfr in order to decompile apk files instantly.☆20Jan 29, 2022Updated 4 years ago
- maccha (抹茶): OpenAI chat frontend with local file access and command execution on macOS☆28May 18, 2025Updated 9 months ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Feb 9, 2026Updated 3 weeks ago
- Gather Open-Source Intelligence using PowerShell.☆178Oct 20, 2019Updated 6 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆189Apr 24, 2025Updated 10 months ago
- ☆21Nov 7, 2025Updated 3 months ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆327Sep 11, 2024Updated last year
- Blacklist ip addresses caught scanning or bruteforcing hosts☆20Jan 6, 2019Updated 7 years ago
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- Anubis Malware Samples☆20Dec 19, 2021Updated 4 years ago
- ☆19Nov 19, 2024Updated last year
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 5 months ago
- Memory Loader Open Source Project by Sentinel-Labs.☆25Mar 26, 2021Updated 4 years ago
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140May 23, 2023Updated 2 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- ☆28Jul 5, 2025Updated 8 months ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆79Jan 8, 2026Updated last month
- Phishing catcher using Certstream☆1,791Aug 13, 2024Updated last year
- ☆36Dec 7, 2020Updated 5 years ago
- Serverless honeytoken 🕵🏻♂️☆81Jan 10, 2023Updated 3 years ago