Lists of VPN providers (automatically updated)
☆791Apr 8, 2026Updated this week
Alternatives and similar repositories for lists_vpn
Users that are interested in lists_vpn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List of Tor exit nodes built by CI☆15Updated this week
- ip addresses of VPNs☆79Apr 5, 2026Updated last week
- Daily updated list of IP addresses / CIDR blocks used by data centers, cloud service providers, servers, etc.☆208Apr 5, 2026Updated last week
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- An open source list of ASNs known to belong to cloud, managed hosting, and colo facilities.☆498Mar 18, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ipsets dynamically updated with firehol's update-ipsets.sh script☆3,794Mar 31, 2026Updated last week
- Aggregation of lists of malicious IP addresses, to be blocked in the WAN > LAN direction, integrated into firewalls: FortiGate, Palo Alto…☆227Updated this week
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- A series of cloud focused KQL queries for threat hunting and DFIR☆12Oct 21, 2025Updated 5 months ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Daily feed of bad IPs (with blacklist hit scores)☆2,235Updated this week
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆766Aug 28, 2025Updated 7 months ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆24Oct 9, 2024Updated last year
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆58Jun 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository contains instructions how to use the free IP Address API. The databases are: ASN database, Geolocation database, hosting …☆115Mar 2, 2026Updated last month
- ☆23Mar 17, 2024Updated 2 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- ☆34Nov 11, 2025Updated 5 months ago
- Extended Static Analysis Tool for Analyzing Android APK Files.☆15Jan 3, 2024Updated 2 years ago
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- The collateral repository for The KQL Mysteries series☆26Mar 8, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Effectively protect your web application from malicious attacks. This lightweight and highly customizable WAF provides HTTP request filte…☆12Mar 15, 2026Updated 3 weeks ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆111Feb 6, 2026Updated 2 months ago
- ☆17Jul 16, 2020Updated 5 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- Basically pipes.sh but rewritten in Python☆13Nov 16, 2025Updated 4 months ago
- IP list of known scanners.☆32Jan 5, 2026Updated 3 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆650Aug 4, 2025Updated 8 months ago
- Network Entity Reputation Database☆37Apr 2, 2026Updated last week
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- JA4TScan is an active TCP server fingerprinting tool.☆108Aug 29, 2024Updated last year
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆93Sep 7, 2023Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆617Updated this week
- Automatically add links to your WordPress content.☆25Aug 29, 2017Updated 8 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year