D4-project / passive-ssh
A Passive SSH back-end and scanner.
☆102Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for passive-ssh
- D4 core software (server and sample sensor client)☆43Updated 10 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆138Updated 3 years ago
- SNIcat☆125Updated 3 years ago
- A simple binary wrapper for DNS canarytokens.☆24Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆28Updated 4 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆161Updated 4 years ago
- Website crawler with YARA detection☆88Updated last year
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆99Updated 5 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆258Updated last year
- Serverless honeytoken 🕵🏻♂️☆78Updated last year
- Data related to the SANS Internet Storm Center☆11Updated 5 years ago
- ☆48Updated 7 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated last year
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆44Updated last year
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆67Updated 11 months ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆66Updated 9 months ago
- Harvest Linux forensic data for operational triage of an event.☆50Updated 4 months ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 2 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 2 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆63Updated 4 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆63Updated 3 weeks ago
- Packet communication investigator☆90Updated last year