t4d / PhishingKit-Yara-SearchLinks
Yara scan Phishing Kit's Zip archive(s)
☆59Updated this week
Alternatives and similar repositories for PhishingKit-Yara-Search
Users that are interested in PhishingKit-Yara-Search are comparing it to the libraries listed below
Sorting:
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 9 months ago
- Hunt malware with Volatility☆47Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Sniffing out well-known threat groups☆28Updated 10 months ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- Can you pay the ransom in your country?☆14Updated last year
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- C2 Active Scanner☆59Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 5 months ago
- Yet another way to find where to report an abuse☆32Updated 5 months ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Ransomware groups posts☆39Updated this week
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…