censys-workshop / threatfox-censysView external linksLinks
Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threatfox.
☆36Jan 8, 2026Updated last month
Alternatives and similar repositories for threatfox-censys
Users that are interested in threatfox-censys are comparing it to the libraries listed below
Sorting:
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 5 months ago
- A Postman collection for the Censys Search APIs.☆33Mar 9, 2023Updated 2 years ago
- Documentation for DFIR ORC, artefact collection tool dedicated to Microsoft Windows☆12May 23, 2025Updated 8 months ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆20Nov 1, 2024Updated last year
- ☆17Nov 12, 2019Updated 6 years ago
- ☆16Apr 30, 2024Updated last year
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 4 months ago
- ☆27Nov 26, 2024Updated last year
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analy…☆44Jul 17, 2025Updated 7 months ago
- ☆36Nov 30, 2023Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 7 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Apr 17, 2018Updated 7 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- A Visual Studio Code Extension agent for Mythic C2☆71Nov 5, 2024Updated last year
- Automate the delivery of your macOS applications outside the App Store.☆13Jul 8, 2024Updated last year
- Configurations for DFIR ORC☆28Mar 28, 2024Updated last year
- ☆35Jan 27, 2025Updated last year