# blackbook **Repository Path**: yunshell/blackbook ## Basic Information - **Project Name**: blackbook - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2024-02-27 - **Last Updated**: 2024-02-27 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ![Logo](https://i.imgur.com/Nji9ubM.jpg) [![License](https://img.shields.io/badge/license-Public_domain-red.svg)](https://wiki.creativecommons.org/wiki/Public_domain) **blackbook** is a historical (black)list of malicious domains created as part of the periodic automated heuristic check (i.e. WHOIS, HTTP, etc.) of newly reported entries from public lists of malicious URLs (currently [CyberCrime](https://cybercrime-tracker.net/), [URLhaus](https://urlhaus.abuse.ch/), [ScumBots](https://twitter.com/scumbots), [Benkow](http://benkow.cc/passwords.php) and [ViriBack](http://tracker.viriback.com/)). Main goal is listing those that are/were malware **dedicated** (e.g. C&C) - thus, excluding compromised sites. It is supposed to be used for detection of malware beaconing infected clients by inspection of associated DNS traffic, with significant reduce of false-positives. ![Example](https://i.imgur.com/FN8r3um.png) Up-to-date detailed CSV list of domains can be found [here](blackbook.csv), while the raw TXT version can be found [here](https://raw.githubusercontent.com/stamparm/blackbook/master/blackbook.txt).