swimlane / trawl
A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity
☆36Updated 3 years ago
Alternatives and similar repositories for trawl:
Users that are interested in trawl are comparing it to the libraries listed below
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 7 months ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆100Updated 3 years ago
- Website crawler with YARA detection☆88Updated last year
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- ☆53Updated 4 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 2 years ago
- FRAC and RIFT☆17Updated 6 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- Python API bindings for FireEye Products☆13Updated 4 years ago
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- ☆39Updated 5 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆26Updated 4 months ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- Triage automation for suspect URLs☆13Updated 5 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆71Updated 3 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Providing timelines based on OSINT Reports☆32Updated last year