CollectMalData is a set of small python scripts that I use to quickly collect information of interest that can be useful during a simple research process.
-
Updated
Jul 10, 2017
CollectMalData is a set of small python scripts that I use to quickly collect information of interest that can be useful during a simple research process.
A collection of scripts that use /etc/hosts to block advertising-related, tracking, and malicious domains.
Really simple tools to automate the generation of black hole Bind zones for known malicious hosts
A repository with source code for the detection of malicious domain.
A simple bash script to Obfuscate | De-Obfuscate bulk malicious domain list
Machine Learning Based Ransomware generated Command and Control Domain Detector.
All of IP's comes from my public honeypot.
Detection of malicious domain names using machine learning and deep learning models
Information gathering & website reconnaissance | https://phishstats.info/
hosts file to protect against malicious domains
A static and dynamic features based URL Classifier.
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
PatternEx domain feed: malicious domains detected with AI
free-nitro.club detection api; /links returns all links and /links/<link> checks if the link is malicious
Collection of phishing and malicious links that focuses on Steam and Discord scams.
🤖 An action that fetches the list of malicious domains on Discord in different providers and creates/updates a JSON file with them from time to time.
Add a description, image, and links to the malicious-domains topic page so that developers can more easily learn about it.
To associate your repository with the malicious-domains topic, visit your repo's landing page and select "manage topics."