censys / censys-maltegoLinks
Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet data available.
☆38Updated 2 years ago
Alternatives and similar repositories for censys-maltego
Users that are interested in censys-maltego are comparing it to the libraries listed below
Sorting:
- NSE script which leverages the Censys Search API for passive data collection☆59Updated 3 years ago
- ☆33Updated 6 months ago
- ☆21Updated 2 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- ☆16Updated 2 months ago
- bap - http Basic Authentication honeyPot☆50Updated 10 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- recon-ng modules for Censys☆37Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 6 months ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25Updated 6 years ago
- Custom Maltego transforms☆67Updated 10 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆64Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 2 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆21Updated 7 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆40Updated 9 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago