D4-project / BGP-RankingLinks
BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)
☆76Updated last month
Alternatives and similar repositories for BGP-Ranking
Users that are interested in BGP-Ranking are comparing it to the libraries listed below
Sorting:
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆95Updated last month
- Suricata rule and intel index☆33Updated this week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Website crawler with YARA detection☆90Updated 2 years ago
- DNSDB API Client, C Version☆104Updated last year
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆56Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated 8 months ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆34Updated last month
- ☆28Updated 4 months ago
- ☆25Updated 3 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆37Updated 2 months ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 7 months ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Updated 6 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- A Python implementation of the Community ID flow hashing standard☆23Updated last year
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 4 months ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- server for indexing and querying passive DNS observations☆49Updated this week
- Passive DNS Common Output Format☆37Updated last year
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago