censys / censys-maltegoLinks
Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet data available.
☆37Updated last year
Alternatives and similar repositories for censys-maltego
Users that are interested in censys-maltego are comparing it to the libraries listed below
Sorting:
- ☆33Updated 4 months ago
- ☆21Updated 2 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- recon-ng modules for Censys☆37Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆60Updated 4 years ago
- Maltego transform for visualizing Nessus scan data☆47Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Fully-featured spear-phishing toolkit - web front-end☆51Updated 4 months ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Updated 7 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆60Updated 4 years ago
- ☆15Updated last year
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆65Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- CLI tools using Harpoon features☆21Updated last year
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 8 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- URL fingerprinting made easy☆86Updated last year
- Website crawler with YARA detection☆88Updated last year