benjojo / dns-spies
The tools used for the DNS spies blog post
☆49Updated 6 years ago
Alternatives and similar repositories for dns-spies:
Users that are interested in dns-spies are comparing it to the libraries listed below
- ☆56Updated 7 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 12 years ago
- DNS Firewall Enforcer☆49Updated 5 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- DNS zone transfer research☆57Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Web of trust grapher☆39Updated 11 months ago
- ☆25Updated 7 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- ☆15Updated 8 years ago
- "RansomPKP" proof of concept.☆11Updated 8 years ago
- An effective attack against the Argon2i hash function☆9Updated 7 years ago
- Engine for capturing, parsing and replaying DNS☆58Updated 2 months ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆28Updated 8 years ago
- DHCP option injector☆40Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 4 months ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- Automated OpenSSH hardening☆42Updated 7 years ago
- Import and display Masscan data☆34Updated last month
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 8 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆22Updated 2 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago