rapid7 / recog
Pattern recognition for hosts, services, and content
☆687Updated last week
Alternatives and similar repositories for recog:
Users that are interested in recog are comparing it to the libraries listed below
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆939Updated 3 years ago
- Dradis Framework: Collaboration and reporting for IT Security teams☆693Updated this week
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆541Updated last year
- Discover Your Attack Surface!☆1,374Updated 2 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆634Updated this week
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,003Updated 4 years ago
- Easy automated vulnerability scanning, reporting and analysis☆699Updated 5 years ago
- Code + documentation for the public GreyNoise API☆314Updated 3 years ago
- Your Everyday Threat Intelligence☆1,809Updated this week
- Machinae Security Intelligence Collector☆508Updated 9 months ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆752Updated last year
- Data Analysis Pipeline☆159Updated last week
- SimplE RePort wrIting and COllaboration tool☆1,094Updated 4 years ago
- An information security preparedness tool to do adversarial simulation.☆1,113Updated 5 years ago
- Automater - IP URL and MD5 OSINT Analysis☆539Updated 6 months ago
- CLI tool for open source and threat intelligence☆1,193Updated 2 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆535Updated 11 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,260Updated 3 weeks ago
- Version 2 of the ThreatCrowd API☆269Updated last year
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆346Updated last year
- Lair is a reactive attack collaboration framework and web application built with meteor.☆378Updated 4 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆720Updated 5 years ago
- Smart Install Exploitation Tool☆575Updated 3 years ago
- Generic Low Interaction Honeypot☆265Updated this week
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆369Updated 3 years ago
- The IKE Scanner☆369Updated 5 months ago
- A Python Package for Data Exfiltration☆771Updated 9 months ago
- Project Sonar☆236Updated last week
- ☆1,062Updated 5 years ago