benjojo / dns-spies
The tools used for the DNS spies blog post
☆50Updated 6 years ago
Related projects: ⓘ
- Command line utility for parsing certificates☆59Updated 3 years ago
- DNS Firewall Enforcer☆49Updated 5 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- ☆56Updated 7 years ago
- Web of trust grapher☆38Updated 5 months ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆43Updated 10 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆122Updated 3 years ago
- D4 core software (server and sample sensor client)☆43Updated 8 months ago
- bash script to download publicly available .svn directories☆16Updated 7 years ago
- ☆25Updated 7 years ago
- ☆22Updated 6 years ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆13Updated this week
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- DNS zone transfer research☆57Updated 7 years ago
- Packet-o-matic NG !☆64Updated last month
- Convert a list of IP addresses/ranges to their minimized cidr form☆36Updated 9 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 7 years ago
- ☆29Updated this week
- ip6.arpa scanner☆32Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆30Updated 6 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆38Updated 4 years ago
- Import and display Masscan data☆32Updated 9 months ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 9 years ago
- ☆52Updated this week
- Perl library for SHODAN☆17Updated 10 years ago
- Hunting for Sybils and anomalies in archived Tor network data.☆43Updated 5 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆23Updated 2 years ago