allfro / canariLinks
Local and Remote Maltego Rapid Transform Development Framework
☆105Updated 9 years ago
Alternatives and similar repositories for canari
Users that are interested in canari are comparing it to the libraries listed below
Sorting:
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Small scripts for doing repeatable tasks☆25Updated 3 years ago
- ☆27Updated 8 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- A Network Inspection Tool☆82Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- CRITs IOC Visualization in Maltego☆28Updated 11 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 10 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 9 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 9 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆69Updated 10 years ago
- Automated memory forensics analysis☆32Updated 6 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Search pastebin for keywords using python☆33Updated 13 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 15 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- a Malware/Threat Analyst Desktop☆89Updated 10 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Prometheus Firewall Analyzer☆48Updated 10 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 10 years ago