breakerspace / weaponizing-censorsLinks
censors pose a threat to the entire Internet
☆135Updated 3 years ago
Alternatives and similar repositories for weaponizing-censors
Users that are interested in weaponizing-censors are comparing it to the libraries listed below
Sorting:
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆175Updated 2 months ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆85Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆125Updated last week
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆70Updated 2 years ago
- packet captures of real-world ddos attacks☆163Updated last week
- ZMapv6: Internet Scanner with IPv6 capabilities☆111Updated 4 months ago
- Hfinger - fingerprinting HTTP requests☆139Updated 2 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆82Updated 2 months ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆129Updated 2 years ago
- A Passive SSH back-end and scanner.☆103Updated last month
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆118Updated last month
- Project to decrypt and parse SSH traffic☆66Updated 4 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated last year
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆99Updated 4 years ago
- IoT and Operational Technology Honeypot☆103Updated last year
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆111Updated 9 months ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆90Updated last year
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆84Updated 2 years ago
- A network packet forensics tool for SSH☆253Updated 4 years ago
- egrets monitors egress☆46Updated 5 years ago
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆131Updated 2 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- High Interaction Honeypot Solution for Redis protocol☆24Updated 4 years ago
- AXFR all the things!☆26Updated 2 weeks ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆111Updated last year
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 3 years ago
- goscanner is a tool for large-scale TLS and SSH scans☆31Updated last year
- Sandfly Linux Stealth Rootkit Decloaking Utility☆100Updated 2 years ago
- NIST-based CVE lookup store and API powered by Rust.☆131Updated 2 weeks ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆85Updated 4 years ago