GreyNoise-Intelligence / GNQL
GreyNoise Query Language
☆82Updated 6 years ago
Alternatives and similar repositories for GNQL
Users that are interested in GNQL are comparing it to the libraries listed below
Sorting:
- A toolkit for Security Researchers☆127Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Linux Incident Response☆90Updated 5 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆115Updated 5 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆159Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 5 months ago
- Python script to hunt phishing kits☆138Updated last year
- A tool to assess data quality, built on top of the awesome OSSEM.☆77Updated 2 years ago
- Valhalla API Client☆68Updated 2 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Automated Tactics Techniques & Procedures☆254Updated last year
- Searches For Threat Hunting and Security Analytics☆241Updated last month
- For storing of the volumes☆4Updated 5 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆90Updated 2 years ago
- A collection of infosec related scripts and information.☆53Updated 7 months ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- automate your MISP installs☆68Updated 4 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆71Updated 3 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago