D4-project / passive-ssh
A Passive SSH back-end and scanner.
☆102Updated last month
Alternatives and similar repositories for passive-ssh:
Users that are interested in passive-ssh are comparing it to the libraries listed below
- D4 core software (server and sample sensor client)☆42Updated last year
- Website crawler with YARA detection☆88Updated last year
- SNIcat☆126Updated 3 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- ☆22Updated 7 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆67Updated 2 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆159Updated 5 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 2 years ago
- ☆48Updated 2 months ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆27Updated 5 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- Graphoscope is a solution to access multiple independent data sources from a common UI and show data relations as a graph☆38Updated 4 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- SMTP honeypot written in Golang☆29Updated 8 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated last year
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 2 months ago
- Automatically exported from code.google.com/p/nipper-ng☆71Updated 2 years ago