GreyNoise Query Language
☆82May 7, 2019Updated 6 years ago
Alternatives and similar repositories for GNQL
Users that are interested in GNQL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code + documentation for the public GreyNoise API☆317Apr 2, 2021Updated 5 years ago
- Python3 library and command line for GreyNoise☆177Apr 6, 2026Updated last week
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- GreyNoise Maltego integration and transforms☆19Mar 14, 2023Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- setup zeek, previously Bro IDS☆18Apr 5, 2026Updated last week
- OWASP Ukraine 2019 CTF☆12Feb 10, 2023Updated 3 years ago
- ☆102Jul 18, 2019Updated 6 years ago
- Scripts for MacOS related tasks.☆18Feb 16, 2020Updated 6 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆71Dec 8, 2022Updated 3 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆93Oct 15, 2017Updated 8 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆80Jan 2, 2022Updated 4 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 9 months ago
- Detect cryptocurrency mining traffic with Zeek.☆46Mar 3, 2021Updated 5 years ago
- Traverse JS files for APIs/Endpoints☆15May 12, 2015Updated 10 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆547May 1, 2025Updated 11 months ago
- Script (meant to run via cron) to monitor, log, and alert when the CPU is throttled due to overheating☆12Oct 5, 2017Updated 8 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Coreboot payload for PC Engines APU2 that sort boot order and save it to flash.☆15May 30, 2025Updated 10 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Main repository to pull all Cisco related projects.☆16Sep 21, 2017Updated 8 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Jun 26, 2020Updated 5 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆53Jun 15, 2022Updated 3 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago