ninoseki / ayashige
Ayashige provides a list of suspicious newly updated domains as a JSON feed
☆38Updated 10 months ago
Alternatives and similar repositories for ayashige:
Users that are interested in ayashige are comparing it to the libraries listed below
- Website crawler with YARA detection☆88Updated last year
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- A toolkit for Security Researchers☆127Updated 5 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Updated 3 years ago
- Yet another way to find where to report an abuse☆32Updated 3 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆58Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆57Updated 3 months ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- Python wrapper for urlscan.io's API☆102Updated 3 years ago
- For storing of the volumes☆4Updated 5 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 10 months ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆61Updated last year
- automate your MISP installs☆68Updated 4 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated last year
- ☆41Updated last year
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 8 months ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago