allfro / canari
Local and Remote Maltego Rapid Transform Development Framework
☆103Updated 8 years ago
Alternatives and similar repositories for canari:
Users that are interested in canari are comparing it to the libraries listed below
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Search pastebin for keywords using python☆33Updated 12 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Threatbutt python client and Maltego transforms☆51Updated 8 months ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆80Updated 9 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆16Updated 9 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Fun with Amazon AWS and Maltego☆29Updated 7 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Small scripts for doing repeatable tasks☆25Updated 2 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- ☆10Updated 9 years ago
- ☆27Updated 7 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆48Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Some IR notes☆73Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago