DarrenRainey / Global-Masscan-Blacklist
A blacklist of IPs that don't like being scanned
☆9Updated 7 years ago
Related projects: ⓘ
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆10Updated 3 years ago
- ☆12Updated this week
- ld_preload userland rootkit☆33Updated 3 years ago
- ☆16Updated 4 years ago
- Truehunter☆29Updated 3 years ago
- Cross-Platform Reverse Socks Proxy in Go☆25Updated last year
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 3 years ago
- ☆22Updated this week
- Provides access to libhashcat☆29Updated 5 months ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Generate CIA/NSA style project codenames☆23Updated 6 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 6 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆28Updated 4 years ago
- suspect is a simple bash triage tool☆17Updated 6 years ago
- Lansweeper Password Recovery Tool☆11Updated 8 years ago
- ARP Man-in-the-Middle tool☆27Updated 4 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- AXFR all the things!☆23Updated 3 months ago
- Multi-head SSH honeypot system.☆18Updated 5 months ago
- Perl script to test the reliability of a list of open web proxies.☆27Updated 7 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- Downgrade HTTP authentication on the network to capture clear-text credentials from clients☆15Updated 10 months ago
- A collection of captured SSH login credentials☆15Updated 3 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago