censys-workshop / threatfox-censys
Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threatfox.
☆30Updated this week
Related projects ⓘ
Alternatives and complementary repositories for threatfox-censys
- JA4TScan is an active TCP server fingerprinting tool.☆56Updated 2 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆108Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆54Updated 5 months ago
- ☆42Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Collection of IoCs available and related to attacks on ESXi infrastructures that occurred as of Friday February 3, 2023.☆12Updated last year
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆26Updated 10 months ago
- External telegram feeder for AIL framework☆13Updated last week
- ☆22Updated 2 years ago
- ☆29Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 3 months ago
- C2 Active Scanner☆48Updated 5 months ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 8 months ago
- URL fingerprinting made easy☆79Updated 7 months ago
- This repository contains a mindmap for different techniques for using Censys Search☆12Updated last year
- Hashes of infamous malware☆26Updated last year
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 weeks ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆42Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆54Updated last month
- ☆15Updated 4 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- Distributed network and vulnerability scanner☆43Updated 8 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 8 months ago
- ☆9Updated 6 months ago
- A rogue DNS detector☆23Updated last year