GreyNoise-Intelligence / greynoise-maltegoLinks
GreyNoise Maltego integration and transforms
☆20Updated 2 years ago
Alternatives and similar repositories for greynoise-maltego
Users that are interested in greynoise-maltego are comparing it to the libraries listed below
Sorting:
- ☆33Updated 4 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Maltego transform for visualizing Nessus scan data☆47Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated last year
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆24Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆65Updated 7 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 12 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Admin for☆17Updated 7 years ago
- Principles of MITRE ATT&CK in the fraud domain☆34Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆60Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- Some YARA rules i will add from time to time☆12Updated 6 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- A few transforms and a machine for parsing Nmap XML results☆38Updated 8 years ago