Rafiot / bgp-ranking
For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous system. ISP customers are using the capacity of the Internet Service Provider to reach Internet services over other AS. Some of those communications can be malicious (e.g. due to malware activities on an end-use…
☆21Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for bgp-ranking
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Updated 6 years ago
- NTP logger/honeypot☆52Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated last month
- Spam trap management☆23Updated 5 months ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆105Updated last year
- ☆19Updated 6 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 5 years ago
- ☆24Updated 4 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 9 years ago
- BGP Route Leaks Detection☆70Updated 5 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated 10 months ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated last year
- API to access the Redis database of a BGP Ranking instance.☆17Updated 6 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 4 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Farsight Security Blog code☆10Updated 6 months ago