All Projects → ninoseki → ayashige

ninoseki / ayashige

Licence: MIT License
Ayashige provides a list of suspicious newly updated domains as a JSON feed

Programming Languages

python
139335 projects - #7 most used programming language
Dockerfile
14818 projects

Projects that are alternatives of or similar to ayashige

Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (+314.81%)
Mutual labels:  osint, threat-intelligence
Opensquat
Detection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (+451.85%)
Mutual labels:  osint, threat-intelligence
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (+355.56%)
Mutual labels:  osint, threat-intelligence
OSINT-Brazuca
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (+1781.48%)
Mutual labels:  osint, threat-intelligence
Mihari
A helper to run OSINT queries & manage results continuously
Stars: ✭ 239 (+785.19%)
Mutual labels:  osint, threat-intelligence
Harpoon
CLI tool for open source and threat intelligence
Stars: ✭ 679 (+2414.81%)
Mutual labels:  osint, threat-intelligence
Intelowl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+7729.63%)
Mutual labels:  osint, threat-intelligence
Python Iocextract
Defanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (+1011.11%)
Mutual labels:  osint, threat-intelligence
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+733.33%)
Mutual labels:  osint, threat-intelligence
Misp Modules
Modules for expansion services, import and export in MISP
Stars: ✭ 198 (+633.33%)
Mutual labels:  osint, threat-intelligence
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+25388.89%)
Mutual labels:  osint, threat-intelligence
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (+7.41%)
Mutual labels:  osint, threat-intelligence
Mitaka
A browser extension for OSINT search
Stars: ✭ 483 (+1688.89%)
Mutual labels:  osint, threat-intelligence
Phishing catcher
Phishing catcher using Certstream
Stars: ✭ 1,232 (+4462.96%)
Mutual labels:  osint, threat-intelligence
Threatingestor
Extract and aggregate threat intelligence.
Stars: ✭ 439 (+1525.93%)
Mutual labels:  osint, threat-intelligence
Opencti
Authors
Stars: ✭ 2,165 (+7918.52%)
Mutual labels:  osint, threat-intelligence
Stalkphish
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+848.15%)
Mutual labels:  osint, threat-intelligence
Dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+11470.37%)
Mutual labels:  osint, threat-intelligence
Misp Training
MISP trainings, threat intel and information sharing training materials with source code
Stars: ✭ 185 (+585.19%)
Mutual labels:  osint, threat-intelligence
Omnibus
The OSINT Omnibus (beta release)
Stars: ✭ 243 (+800%)
Mutual labels:  osint, threat-intelligence

Ayashige

Python CI Coverage Status

Ayashige provides a list of suspicious newly registered domains as a JSON feed.

How it works

  • It collects newly registered domains via Certififate Transparency log servers and SecurityTrails.
  • It computes a suspicious score of a given domain.
  • It stores suspicious domains into a Redis instance.
  • It provides suspicious domains as a JSON via /api/v1/domains/ endpoint.

Requirements

Installation

git clone https://github.com/ninoseki/ayashige
cd ayashige
docker compose --env-file .env up -d

Demo

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/ninoseki/ayashige.

License

The repository is available as open source under the terms of the MIT License.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].