SIDN / CycleHunterLinks
Python software that reads zone files, extract NS records, and detect cyclic dependencies
☆37Updated last year
Alternatives and similar repositories for CycleHunter
Users that are interested in CycleHunter are comparing it to the libraries listed below
Sorting:
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- A Passive SSH back-end and scanner.☆104Updated 5 months ago
- BGP Route Leaks Detection☆71Updated 7 years ago
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.☆46Updated 5 years ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 3 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆75Updated last week
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated 10 months ago
- ☆50Updated 4 months ago
- SNIcat☆128Updated 4 years ago
- ☆15Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- BGP reverse proxy☆122Updated this week
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 5 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆74Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- ☆68Updated last year
- BGP Hijack Detection☆115Updated 7 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Base64 Mutator☆13Updated 4 years ago
- Cisco Type 7 Password Decrypter☆124Updated 2 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- ☆17Updated 5 years ago
- ☆22Updated 7 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆100Updated 4 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 4 months ago
- some config files☆14Updated this week
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago