Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threatfox.
☆36Jan 8, 2026Updated 2 months ago
Alternatives and similar repositories for threatfox-censys
Users that are interested in threatfox-censys are comparing it to the libraries listed below
Sorting:
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- Documentation for DFIR ORC, artefact collection tool dedicated to Microsoft Windows☆12May 23, 2025Updated 9 months ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- ☆17Nov 12, 2019Updated 6 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Aug 26, 2023Updated 2 years ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆20Nov 1, 2024Updated last year
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆49Jul 25, 2023Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 5 months ago
- ☆27Nov 26, 2024Updated last year
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- ☆24Sep 28, 2022Updated 3 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- Malware management program and tools☆27Dec 16, 2015Updated 10 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Windows Runtime API Interop Utilities for Windows PowerShell☆30Jan 10, 2020Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Apr 17, 2018Updated 7 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- A Visual Studio Code Extension agent for Mythic C2☆72Nov 5, 2024Updated last year
- A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analy…☆48Jul 17, 2025Updated 7 months ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated last year
- Automate the delivery of your macOS applications outside the App Store.☆13Jul 8, 2024Updated last year
- ☆33Jun 12, 2024Updated last year
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago