benjojo / dns-spies
The tools used for the DNS spies blog post
☆48Updated 6 years ago
Alternatives and similar repositories for dns-spies:
Users that are interested in dns-spies are comparing it to the libraries listed below
- Command line utility for parsing certificates☆63Updated 4 years ago
- DNS Firewall Enforcer☆49Updated 6 years ago
- ☆25Updated 7 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆125Updated 4 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- The noise swiss army knife☆44Updated 4 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- A malicious BGP daemon that forces a TCP zero window edge case☆20Updated 4 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- ☆56Updated 7 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆22Updated 3 years ago
- Host files with DNS☆32Updated 9 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- GO sandbox to run untrusted code☆42Updated 5 years ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆14Updated 3 weeks ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- DHCP option injector☆42Updated 4 years ago
- Web of trust grapher☆38Updated 3 weeks ago
- Import and display Masscan data☆35Updated last week
- The RIPE NCC DNS Monitoring Service (DNSMON) provides a comprehensive, objective and up-to-date overview of the quality of the service of…☆30Updated 9 months ago
- DNS zone transfer research☆59Updated 8 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- ☆44Updated 2 months ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- New TLS Padding Oracles☆125Updated last year
- Recon system hardening scanner☆47Updated 8 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- "RansomPKP" proof of concept.☆11Updated 8 years ago