rapid7 / recogLinks
Pattern recognition for hosts, services, and content
☆726Updated last week
Alternatives and similar repositories for recog
Users that are interested in recog are comparing it to the libraries listed below
Sorting:
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆945Updated 4 years ago
- Easy automated vulnerability scanning, reporting and analysis☆701Updated 5 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆753Updated last year
- Dradis Framework: Collaboration and reporting for IT Security teams☆715Updated this week
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆546Updated 2 years ago
- Data Analysis Pipeline☆159Updated 4 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated last month
- An information security preparedness tool to do adversarial simulation.☆1,124Updated 6 years ago
- Machinae Security Intelligence Collector☆526Updated last year
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- An easy-to-use and lightweight API wrapper for Censys APIs.☆439Updated last week
- Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's☆278Updated 5 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,048Updated last month
- Attack Surface Management since before Attack Surface Management was a thing☆645Updated 2 weeks ago
- SimplE RePort wrIting and COllaboration tool☆1,099Updated 5 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆671Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,284Updated 5 months ago
- Version 2 of the ThreatCrowd API☆271Updated 2 years ago
- The IKE Scanner☆383Updated 9 months ago
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,015Updated 5 years ago
- A low to medium interaction honeypot.☆469Updated last year
- Extract and aggregate threat intelligence.☆868Updated last year
- Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension☆380Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆480Updated last month
- Fast DNS Lookup Library and CLI Tool☆1,003Updated this week
- O-Saft - OWASP SSL advanced forensic tool☆378Updated 2 months ago
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆629Updated last year
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,312Updated last year