GreyNoise-Intelligence / greynoise-maltego
GreyNoise Maltego integration and transforms
☆20Updated last year
Alternatives and similar repositories for greynoise-maltego:
Users that are interested in greynoise-maltego are comparing it to the libraries listed below
- ☆34Updated 6 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Maltego transform for visualizing Nessus scan data☆46Updated 5 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated last year
- Home to the ActorTrackr source code☆28Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Principles of MITRE ATT&CK in the fraud domain☆34Updated 5 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated 11 months ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆55Updated 3 years ago
- Scout - a Contactless Active Reconnaissance Tool☆51Updated 2 years ago
- Automation platform for open source intelligence☆13Updated last year
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated last year
- A Python DNS crawler to find identical domain names under different TLDs.☆24Updated 5 years ago
- Admin for☆15Updated 6 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- Yara scan Phishing Kit's Zip archive(s)☆55Updated 9 months ago