GreyNoise-Intelligence / GNQLLinks
GreyNoise Query Language
☆82Updated 6 years ago
Alternatives and similar repositories for GNQL
Users that are interested in GNQL are comparing it to the libraries listed below
Sorting:
- Simulating Adversary Operations☆96Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- A toolkit for Security Researchers☆128Updated 6 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Python3 library and command line for GreyNoise☆153Updated 2 months ago
- Automated Tactics Techniques & Procedures☆257Updated 2 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆50Updated 2 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆73Updated 4 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated 11 months ago
- Python script to hunt phishing kits☆139Updated 2 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- penetration testing scripts☆136Updated 6 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Updated 5 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- ☆76Updated 7 years ago
- Scout - a Contactless Active Reconnaissance Tool☆55Updated 2 years ago
- thethe☆116Updated 5 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆112Updated 4 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 6 years ago
- Valhalla API Client☆70Updated 2 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago