censys / censys-maltego
Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet data available.
☆37Updated last year
Alternatives and similar repositories for censys-maltego:
Users that are interested in censys-maltego are comparing it to the libraries listed below
- ☆34Updated 2 months ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- ☆21Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- recon-ng modules for Censys☆37Updated last year
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Squatm3 is a python tool designed to enumerate available domains generated modifying the original domain name through different technique…☆41Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Collect OSINT from git repositories☆20Updated 3 years ago
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- Principles of MITRE ATT&CK in the fraud domain☆34Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆19Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 3 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Fully-featured spear-phishing toolkit - web front-end☆49Updated 2 months ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated last year
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆33Updated 3 years ago
- Maltego transform for visualizing Nessus scan data☆46Updated 5 years ago