anthonykasza / snapshooterView external linksLinks
It's like a polaroid, but for domains
☆24Feb 6, 2015Updated 11 years ago
Alternatives and similar repositories for snapshooter
Users that are interested in snapshooter are comparing it to the libraries listed below
Sorting:
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33May 14, 2016Updated 9 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15May 5, 2023Updated 2 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 3 years ago
- PassiveDNS in Go☆125Feb 6, 2026Updated last week
- List of netblocks with shared hosting on 20170330☆10Apr 10, 2017Updated 8 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Honeypot Intelligence with Splunk☆256Oct 18, 2018Updated 7 years ago
- Scripts that are suited for blue teams☆33Mar 17, 2016Updated 9 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Apr 15, 2019Updated 6 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- ☆16Jul 19, 2017Updated 8 years ago
- A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in th…☆33Oct 13, 2022Updated 3 years ago
- Meeting notes☆14Apr 5, 2016Updated 9 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 9 years ago