censys / censys-maltego
Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet data available.
☆37Updated last year
Alternatives and similar repositories for censys-maltego:
Users that are interested in censys-maltego are comparing it to the libraries listed below
- GreyNoise Maltego integration and transforms☆20Updated last year
- ☆34Updated last month
- Maltego transform for visualizing Nessus scan data☆46Updated 5 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 9 months ago
- recon-ng modules for Censys☆37Updated last year
- ☆21Updated last year
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆56Updated 4 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆64Updated 7 years ago
- Home to the ActorTrackr source code☆28Updated 7 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- URL fingerprinting made easy☆86Updated 11 months ago
- Hashes of infamous malware☆25Updated last year
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- ☆13Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆55Updated 9 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 6 months ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated last year