GreyNoise-Intelligence / GNQL
GreyNoise Query Language
☆82Updated 5 years ago
Alternatives and similar repositories for GNQL:
Users that are interested in GNQL are comparing it to the libraries listed below
- A toolkit for Security Researchers☆127Updated 5 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆100Updated 3 years ago
- For storing of the volumes☆4Updated 5 years ago
- Python3 library and command line for GreyNoise☆152Updated 2 weeks ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 5 months ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Valhalla API Client☆68Updated 2 years ago
- ☆76Updated 6 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆159Updated 5 years ago
- A collection of infosec related scripts and information.☆53Updated 6 months ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆89Updated 2 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆40Updated 9 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆77Updated 2 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago