A curated list of Awesome Threat Intelligence resources
created at Dec. 21, 2015, 11:31 a.m.
Cross-language temporary (disposable/throwaway) email detection library. Covers 55 734+ fake email providers.
created at March 4, 2013, 3 p.m.
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
created at April 12, 2012, 8:22 p.m.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
created at Feb. 19, 2012, 1:30 a.m.
Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage
created at Dec. 17, 2015, 8:58 p.m.
The CNIL publishes a GDPR guide for developers
created at June 11, 2020, 7:46 a.m.
List of Dirty, Naughty, Obscene, and Otherwise Bad Words
created at March 9, 2012, 2:15 a.m.
A list of temporary email providers
created at Jan. 13, 2016, 5:23 p.m.
PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in #phishingkit , maintained by @neonprimetime
created at Nov. 29, 2018, 9:30 p.m.
Meaningful control of data in distributed systems.
created at March 4, 2019, 6:08 p.m.
JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.
created at June 13, 2017, 10:54 p.m.
Hunt down social media accounts by username across social networks
created at Dec. 24, 2018, 2:30 p.m.
📙 Amazon Web Services — a practical guide
created at July 13, 2016, 5:30 p.m.