Rafiot / bgp-ranking
For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous system. ISP customers are using the capacity of the Internet Service Provider to reach Internet services over other AS. Some of those communications can be malicious (e.g. due to malware activities on an end-use…
☆21Updated 8 years ago
Alternatives and similar repositories for bgp-ranking:
Users that are interested in bgp-ranking are comparing it to the libraries listed below
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 5 months ago
- More Obvious Webmalware Repository☆15Updated 8 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- ☆24Updated 5 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Updated 7 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- first commit☆20Updated last year
- Farsight Security Blog code☆9Updated 10 months ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 7 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Updated 7 years ago
- Flow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files☆44Updated 10 months ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 9 years ago
- Spam trap management☆23Updated 9 months ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- BGP Hijack Detection☆111Updated 7 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- Various blog post projects.☆10Updated 9 months ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago