ninoseki / fangerLinks
An npm package to defang and refang IoC
☆12Updated 4 months ago
Alternatives and similar repositories for fanger
Users that are interested in fanger are comparing it to the libraries listed below
Sorting:
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Convert Wigle.net result from json to Kml☆15Updated 5 years ago
- Useful commands for infosec☆28Updated 2 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆12Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆26Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Yet another dirbuster tool☆12Updated 2 years ago
- ☆33Updated 11 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Collection of scripts used to analyse malware or emails☆20Updated 5 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated last year
- A CLI tool for querying passive DNS services☆42Updated 2 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- A rogue DNS detector☆24Updated last month
- ☆24Updated 3 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Golang implementation of PyMISP-feedgenerator☆18Updated 3 years ago
- ☆22Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- A scanner for taking basic fingerprints☆50Updated 5 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- ☆14Updated 7 years ago
- Converting data from services like Censys and Shodan to a common data model☆50Updated this week