breakerspace / weaponizing-censors
censors pose a threat to the entire Internet
☆132Updated 3 years ago
Alternatives and similar repositories for weaponizing-censors:
Users that are interested in weaponizing-censors are comparing it to the libraries listed below
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆160Updated last month
- ☆297Updated last year
- A network packet forensics tool for SSH☆255Updated 3 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆98Updated 3 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆113Updated last year
- IoT and Operational Technology Honeypot☆105Updated last year
- XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.☆393Updated 4 months ago
- Vault Exploit Defense☆124Updated 4 months ago
- Project to decrypt and parse SSH traffic☆63Updated 4 years ago
- ☆277Updated 2 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆107Updated 3 months ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆154Updated 4 months ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆102Updated 5 months ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆83Updated 7 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆116Updated this week
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆224Updated 3 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆125Updated last year
- ZMapv6: Internet Scanner with IPv6 capabilities☆107Updated this week
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆188Updated 8 months ago
- NIST-based CVE lookup store and API powered by Rust.☆127Updated 2 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Updated 3 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆183Updated 8 months ago
- Hfinger - fingerprinting HTTP requests☆136Updated last year
- Utility to find hidden Linux kernel modules☆145Updated last month
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆42Updated 4 years ago
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆560Updated 2 years ago
- SonicWall SSL-VPN Exploit☆174Updated 3 years ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 2 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆72Updated 2 years ago