t4d / PhishingKit-Yara-SearchLinks
Yara scan Phishing Kit's Zip archive(s)
☆62Updated 5 months ago
Alternatives and similar repositories for PhishingKit-Yara-Search
Users that are interested in PhishingKit-Yara-Search are comparing it to the libraries listed below
Sorting:
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 7 months ago
- Converting data from services like Censys and Shodan to a common data model☆51Updated 5 months ago
- URL fingerprinting made easy☆89Updated last year
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆62Updated 6 months ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 2 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- Cyber Threats Detection Rules☆14Updated 2 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- A collection of tips for using MISP.☆75Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- ☆96Updated 7 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Yet another way to find where to report an abuse☆30Updated 10 months ago
- AIL project training materials☆38Updated 4 months ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 5 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Collection of YARA signatures from individual research☆45Updated 2 years ago
- ☆28Updated 5 months ago