I hereby claim:
- I am superducktoes on github.
- I am superducktoes1 (https://keybase.io/superducktoes1) on keybase.
- I have a public key whose fingerprint is D846 E33D 40A1 C1D3 0A54 24D2 7E5B 32D1 A47B 0D82
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| <form version="1.1"> | |
| <label>Email RIOT</label> | |
| <fieldset submitButton="false"> | |
| <input type="time" token="field1"> | |
| <label></label> | |
| <default> | |
| <earliest>-30d@d</earliest> | |
| <latest>now</latest> | |
| </default> | |
| </input> |
| <form version="1.1"> | |
| <label>Country Report</label> | |
| <fieldset submitButton="false"> | |
| <input type="dropdown" token="field1" searchWhenChanged="true"> | |
| <label>Country</label> | |
| <fieldForLabel>source_country</fieldForLabel> | |
| <fieldForValue>source_country</fieldForValue> | |
| <search> | |
| <query>|inputlookup greynoise_indicators_collection| dedup source_country | table source_country | sort source_country</query> | |
| <earliest>-24h@h</earliest> |
| import requests | |
| # replace with CVE and GreyNoise API key | |
| CVE = "CVE-2024-3273" | |
| GN_API_KEY = "<GN_API_KEY>" | |
| headers = { | |
| "accept": "application/json", | |
| "key": GN_API_KEY | |
| } |
| ''' | |
| reads from a file cve_grouping.txt that takes a cve on each line to query greynoise and find ips exploiting each cve | |
| ''' | |
| from greynoise import GreyNoise | |
| from functools import reduce | |
| api_client = GreyNoise(api_key="<api_key>") | |
| cve_grouping = {} |
| 135.125.246.189 - - [04/Jan/2024:19:56:47 +0000] "POST / HTTP/1.1" 200 3460 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" | |
| 135.125.246.189 - - [04/Jan/2024:19:56:47 +0000] "GET /.env HTTP/1.1" 404 492 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" | |
| 205.210.31.40 - - [04/Jan/2024:19:25:30 +0000] "\x16\x03\x01" 400 487 "-" "-" | |
| 205.210.31.40 - - [04/Jan/2024:19:25:30 +0000] "\x16\x03\x01" 400 487 "-" "-" | |
| 193.23.3.64 - - [04/Jan/2024:19:22:19 +0000] "GET /.env HTTP/1.1" 404 488 "-" "-" | |
| 193.23.3.64 - - [04/Jan/2024:19:22:19 +0000] "GET /.env HTTP/1.1" 404 488 "-" "-" | |
| 54.173.133.244 - - [04/Jan/2024:19:18:54 +0000] "GET /downloads/.git/config HTTP/1.1" 404 455 "-" "Mozilla/5.0 (Linux; Android 8.1.0; LM-Q710.FG) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.101 Mobile Safari/537.36" | |
| 192.155.90.118 - - [04/Jan/2024:19:16:08 +0000] "\x16\x03\x01" 400 487 "-" "-" | |
| 185.254.196.173 - - |
| # python3 ip_hash_query.py 36.106.167.25 | |
| # takes an ip address as an argument and displays a list of ja3 fingerprints | |
| # paste fingerprint into prompt to get a list of IP's associated with it | |
| import requests | |
| import sys | |
| ip = sys.argv[1] | |
| url = "https://api.greynoise.io/v2/noise/context/" + ip | |
| API_KEY = "" |
| from greynoise import GreyNoise | |
| # change API key and query | |
| api_key = "<GN_API_KEY>" | |
| gn_query = "last_seen:1d classification:malicious spoofable:false" | |
| # set up api client | |
| api_client = GreyNoise(api_key=api_key) | |
| ip_list = [] | |
| complete = False |
| import matplotlib.pyplot as plt | |
| import numpy as np | |
| import requests | |
| import json | |
| GN_API_KEY = "" | |
| GN_QUERY = 'jira last_seen:30d' | |
| GN_QUERY_URL = "https://api.greynoise.io/v2/experimental/gnql" | |
| HEADERS = { |