stamparm / blackbookLinks
Blackbook of malware domains
☆252Updated 9 months ago
Alternatives and similar repositories for blackbook
Users that are interested in blackbook are comparing it to the libraries listed below
Sorting:
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆157Updated 7 months ago
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆575Updated this week
- Defanged Indicator of Compromise (IOC) Extractor.☆531Updated 9 months ago
- Zeek-Formatted Threat Intelligence Feeds☆367Updated this week
- Don't Just Search OSINT. Sweep It.☆315Updated 4 years ago
- Awesome VirusTotal Intelligence Search Queries☆332Updated 2 years ago
- A phishing kit collector for scavengers☆214Updated last month
- Threat-Intelligence Feeds & Tools & Frameworks☆217Updated last year
- Visualize networks of phishing by querying the phishstats.info API☆79Updated 9 months ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆375Updated 3 years ago
- ☆201Updated last year
- An awesome list of resources on deception-based security with honeypots and honeytokens☆173Updated 5 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆182Updated last month
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆96Updated 5 months ago
- Cyber Threat Intelligence Feeds☆96Updated 8 years ago
- Incident Response - Fast suspicious file finder☆242Updated 3 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆150Updated 2 years ago
- DFIRTrack - The Incident Response Tracking Application☆499Updated 9 months ago
- Malicious IP source.☆97Updated this week
- Extract and aggregate threat intelligence.☆865Updated last year
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆563Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Malware Configuration And Payload Extraction☆757Updated 6 months ago
- User guide of MISP☆268Updated 5 months ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆202Updated last year
- Suricata rules for network anomaly detection☆164Updated last month
- Ransomware leak site monitoring☆312Updated 3 years ago
- Python Scanner for passing IP addresses and utilizing AbuseIPdb API to find bad IPs☆57Updated 5 months ago
- A tool designed to hunt for Phishing Kit source code☆222Updated 2 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆282Updated last year