breakerspace / weaponizing-censorsLinks
censors pose a threat to the entire Internet
☆141Updated 4 years ago
Alternatives and similar repositories for weaponizing-censors
Users that are interested in weaponizing-censors are comparing it to the libraries listed below
Sorting:
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆192Updated last month
- packet captures of real-world ddos attacks☆166Updated 3 months ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆117Updated 3 months ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆137Updated this week
- Passive DNS Capture and Monitoring Toolkit☆350Updated this week
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆118Updated 2 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 9 months ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆77Updated 3 years ago
- Hfinger - fingerprinting HTTP requests☆142Updated 2 years ago
- A network packet forensics tool for SSH☆253Updated 4 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 5 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆121Updated last month
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆192Updated last year
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆132Updated 2 years ago
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆36Updated last year
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆70Updated 6 months ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 6 years ago
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆137Updated 3 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆226Updated 10 months ago
- QUICk - a go library based on gopacket for analyzing QUIC CHLO messages☆22Updated 5 years ago
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆224Updated 4 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 5 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated last month
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆63Updated 5 years ago
- A fast and secure multi protocol honeypot.☆326Updated 3 years ago