maltegotransforms / opencti-maltegoLinks
Maltego local and server integration for OpenCTI
☆32Updated 11 months ago
Alternatives and similar repositories for opencti-maltego
Users that are interested in opencti-maltego are comparing it to the libraries listed below
Sorting:
- URL fingerprinting made easy☆86Updated last year
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- ☆21Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Maltego transform for visualizing Nessus scan data☆47Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated this week
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆177Updated last year
- ☆11Updated 4 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- Generation of STIX2 compliant entities for Maltego☆20Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- ☆12Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆18Updated last week
- ☆33Updated 5 months ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago