typosquatter / ail-typo-squatting
Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.
☆83Updated 4 months ago
Alternatives and similar repositories for ail-typo-squatting:
Users that are interested in ail-typo-squatting are comparing it to the libraries listed below
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆66Updated 2 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆72Updated this week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 2 months ago
- Website for ail-typo-squatting library☆55Updated 7 months ago
- ☆121Updated this week
- ☆86Updated 4 months ago
- The Threat Actor Profile Guide for CTI Analysts☆102Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆30Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆68Updated 2 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last month
- Building a consolidated RSS feed for articles about cyberattacks☆63Updated this week
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆31Updated 5 months ago
- Forensic Artifact Collection Tool Matrix☆79Updated 2 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- ☆27Updated this week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆116Updated 9 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 4 months ago
- Cyber Underground General Intelligence Requirements☆89Updated 11 months ago
- ☆45Updated 9 months ago
- BlackBerry Threat Research & Intelligence☆96Updated last year
- MISP Playbooks☆182Updated last month
- A home for detection content developed by the delivr.to team☆63Updated last month
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- Extracting IoC data from eMail☆127Updated 3 weeks ago
- A collection of tips for using MISP.☆74Updated last month
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆35Updated 3 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆145Updated 3 months ago