D4-project / passive-ssh
A Passive SSH back-end and scanner.
☆102Updated 3 weeks ago
Alternatives and similar repositories for passive-ssh:
Users that are interested in passive-ssh are comparing it to the libraries listed below
- D4 core software (server and sample sensor client)☆42Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆72Updated 8 months ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆159Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- SNIcat☆126Updated 3 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆94Updated 3 years ago
- Website crawler with YARA detection☆88Updated last year
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated last month
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated 11 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Files vetted, and approved for public release☆53Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- Routopsy - Hacking Routers with Routers☆172Updated 3 years ago
- ☆47Updated 2 months ago
- ☆33Updated 3 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 2 years ago
- Data related to the SANS Internet Storm Center☆10Updated 6 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Updated 5 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆109Updated 2 months ago