111 skills found · Page 1 of 4
sefinek / Sefinek Blocklist Collection🌍 A repository of blocklists for various DNS servers, featuring over 100 links and more than 6 million domains. Additionally, you can use our personalized Blocklist Generator to customize content filtering according to your individual needs, giving you full control over what should be blocked on your network.
brannondorsey / WhonowA "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
0xDanielLopez / TweetFeedTweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
eschultze / URLextractorInformation gathering & website reconnaissance | https://phishstats.info/
nikolaischunk / Discord Phishing LinksAn actively maintained JSON & txt List containing 22'000+ malicious Domains which are used for phishing on Discord.
andrewaeva / DGAThe repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research the possibility of applying machine learning and neural networks to detect and classify malicious domains.
codingo / MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
DevSpen / Scam LinksCollection of phishing and malicious links that focuses on Steam and Discord scams.
BobNisco / Adblocking Vpn🔒 Create your own VPN server that blocks malicious domains to enhance your security and privacy
fuchuanpu / WhisperRealtime Robust Malicious Traffic Detection via Frequency Domain Analysis
rodanmaharjan / ThreatIntelligenceThis repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals to enhance threat detection and improve incident response capabilities.
alexandrosmagos / Dyn Dns ListThis repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes only and can be used for a variety of purposes, including blocking malicious domains, filtering content, and enhancing privacy and security.
jarelllama / Scam BlocklistBlocklist for newly created scam, phishing, and other malicious domains automatically retrieved daily using Google Search API, automated detection, and public databases.
OsmanKandemir / Indicator IntelligenceFinds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.
romainmarcoux / Malicious DomainsAggregation of lists of malicious domains (phishing) that can be integrated into FortiGate firewalls and other products.
shoenig / DonutdnsBlock ads, trackers, and malicious sites with donutdns - simple alternative to pihole. Run as a docker container, standalone executable or core DNS plugin. Supply custom domain block/allow lists in addition to builtin lists maintained by the ad-blocking community.
Dogino / Discord Phishing URLsDaily updated list.txt and Pi-Hole adlist of phishing domains used on Discord & Steam
h-j-13 / Malicious Domain Whois:beginner: 非法域名挖掘与画像系统
bongochong / CWP UtilitiesCombined Windows Privacy Utilities | Hosts file updater, block list manager, and more. Open source tools for Windows users, to help ensure privacy & security. Block ads, spyware domains, and other malicious activity/traffic, all through a simple interface.
RoseSecurity / Obfusc8tedYou and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to the Human Resources representative, they did not notice any anomalous activity while browsing the web, but the AppleLabs' system information and event management (SIEM) instance alerted on a suspicious domain. Moments later, the host-based intrusion detection system (HIDS) alerted on several malicious programs acting as potential keyloggers. While the AppleLabs' IT and Incident Response Teams struggle to find the answers, can you lend us your digital forensic experience to hunt down this threat actor?