breakerspace / weaponizing-censorsLinks
censors pose a threat to the entire Internet
☆134Updated 3 years ago
Alternatives and similar repositories for weaponizing-censors
Users that are interested in weaponizing-censors are comparing it to the libraries listed below
Sorting:
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆173Updated last month
- IoT and Operational Technology Honeypot☆104Updated last year
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆99Updated 4 years ago
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆226Updated 3 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆118Updated 2 weeks ago
- ☆302Updated last year
- Passive DNS Capture and Monitoring Toolkit☆329Updated 3 weeks ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆81Updated last month
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆128Updated 2 years ago
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆131Updated 2 years ago
- your censor is my censor: weaponizing residual censorship to perform availability attacks☆22Updated 3 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆121Updated last week
- packet captures of real-world ddos attacks☆162Updated 3 years ago
- Project to decrypt and parse SSH traffic☆65Updated 4 years ago
- MikroTik remote jailbreak for v6.x.x☆133Updated last year
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆169Updated 3 years ago
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆568Updated 3 years ago
- SADDNS: Side Channel Based DNS Cache Poisoning Attack☆58Updated 3 years ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆84Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 3 months ago
- Red Canary's eBPF Sensor☆107Updated 3 weeks ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆89Updated last year
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆188Updated last year
- Vault Exploit Defense☆125Updated 9 months ago
- ☆96Updated 3 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆88Updated last year
- ☆277Updated 2 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆100Updated 2 years ago
- Hfinger - fingerprinting HTTP requests☆137Updated 2 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆187Updated last year