swimlane / trawl
A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity
☆36Updated 3 years ago
Alternatives and similar repositories for trawl:
Users that are interested in trawl are comparing it to the libraries listed below
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 2 months ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- A collection of typical false positive indicators☆55Updated 4 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆60Updated last year
- ☆53Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Updated 6 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 6 months ago
- ☆39Updated 5 years ago
- automate your MISP installs☆67Updated 4 years ago
- FRAC and RIFT☆17Updated 6 years ago
- ☆34Updated 4 years ago
- Home to the ActorTrackr source code☆28Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- For storing of the volumes☆4Updated 5 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Updated last year
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Website crawler with YARA detection☆88Updated last year
- Triage automation for suspect URLs☆12Updated 5 years ago
- Tools to search through massive amounts of data☆21Updated 4 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago