SIDN / CycleHunterLinks
Python software that reads zone files, extract NS records, and detect cyclic dependencies
☆36Updated last year
Alternatives and similar repositories for CycleHunter
Users that are interested in CycleHunter are comparing it to the libraries listed below
Sorting:
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- A Python-based client for the Cisco openVuln API☆38Updated 2 months ago
- BGP Route Leaks Detection☆71Updated 7 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 4 years ago
- Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.☆46Updated 6 years ago
- SNIcat☆128Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated last year
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated 3 weeks ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆74Updated 2 years ago
- BGP reverse proxy☆124Updated this week
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆96Updated 3 weeks ago
- A canary designed to minimize the impact from certain Ransomware actors☆100Updated 4 years ago
- Packet communication investigator☆91Updated 3 years ago
- Cisco Type 7 Password Decrypter☆124Updated 2 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆121Updated last month
- Command line utility for parsing certificates☆67Updated 4 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆49Updated 4 years ago
- ☆50Updated 6 months ago
- BGP Hijack Detection☆117Updated 7 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 6 months ago
- ☆21Updated 4 years ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 3 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated last month
- ☆15Updated 4 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago