swimlane / trawlLinks
A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity
☆36Updated 3 years ago
Alternatives and similar repositories for trawl
Users that are interested in trawl are comparing it to the libraries listed below
Sorting:
- Website crawler with YARA detection☆88Updated last year
- A collection of typical false positive indicators☆55Updated 4 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- ☆53Updated 4 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆62Updated last year
- automate your MISP installs☆68Updated 4 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆57Updated this week
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- ☆39Updated 5 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 3 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Tools to search through massive amounts of data☆21Updated 6 months ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Updated 6 years ago