Various lists for threat hunting, enforcing warnings, blocks or research.
Lists are in standard domain formats, but sometimes PAN or Zscaler format to make it clear if it's an inclusive subdomain block.
File | Usage | Description | Tags |
---|---|---|---|
alt-browsers.txt | Block | URL list to alternate browsers including S3s, repos and download locations | browser proxy vpn tor |
cloud-ide.txt | Block, Warning | URL list of cloud-based or browser-based IDEs | C2 IDE DLP |
email-file-extensions.txt | Block | File extension list most orgs likely do not want in their SEG | file extension email gateway |
file-mirrors.txt | Block | URL list of higher risk 3rd party file mirrors | file filez mirror spyware |
living-off-trusted-tunnels.txt | Block | URL list of services often abused | tunnel LOTT LOTS |
login-cloud-service-providers.txt | Block, Warning | URL of logins to common Cloud Service Providers that may not be authorized in your organization | CSP login CASB DLP |
login-registrar.txt | Block | URL list of mostly North American ICANN accredited registrar logins that may not be authorized in your organization | domain ICANN login registrar |
geoshitties.txt | Block, Warning | URL list of free domain-less web hosting commonly used for phishing and credential harvesting | geocities free hosting phishing credential harvesting |
open-redirect.txt | Warning | URL list of open redirects commonly abused on legitimate platforms | LOTS redirect URL |
online-pdf-editors.txt | Block, Warning | URL list of common web-based PDF editors and converters | PDF DLP converter editor |
pasties.txt | Block | URL list of pastebin clones | pastebin c2 c3 threat malware |
sensitive-file-extensions.txt | Block, Strip | File extension list of common IAC, DevOps and admin where credentials, keys and token may exist | DLP email gateway credential exfil |
These lists exist because despite the critical nature of enforcing policy across these objects, vendor-provided categories are too broad or uncategorized. Many small organizations and MSPs do not have the skill, tools, or subscriptions to manage lists themselves, resulting in a widening Cyber Poverty Line. The lists are provided as-is open source intelligence (OSINT).
Most of the lists are intended for control policies within an organization or enterprise. These are not intended as pass-through detections in a SIEM, but do work well in a risk-based alerting (RBA) model utilizing scoring on multiple hits in a short period. Because no list is perfect, it's a helpful canary to escalate risky browsing behavior such as a user hunting for an unblocked pastebin, domain registrar or online PDF editor. Unlike indicators of compromise and the pytramid of pain, these are not threat lists; most of them are legitimate platforms, SaaS, and tools that are abused. You'll want to check if these lists contain any providers your organization has approved and depends on before implementation.
I haven't made an official doc yet, but it's the usual jam.
Currently MIT. There is no limit to user, practitioner, and vendor for individual or commercial purposes. These lists are only suggestions to mitigate potential risks in an organization. It is not an industry standard or best practice--but a default deny is.