breakerspace / weaponizing-censorsLinks
censors pose a threat to the entire Internet
☆140Updated 4 years ago
Alternatives and similar repositories for weaponizing-censors
Users that are interested in weaponizing-censors are comparing it to the libraries listed below
Sorting:
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆183Updated 6 months ago
- packet captures of real-world ddos attacks☆167Updated 3 weeks ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆114Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆129Updated last week
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆128Updated 2 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆115Updated last week
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆74Updated 2 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆120Updated 3 weeks ago
- IoT and Operational Technology Honeypot☆104Updated 2 years ago
- A Passive SSH back-end and scanner.☆104Updated 4 months ago
- Fork: THC-SSL-DOS is a tool to verify the performance of SSL.☆59Updated 3 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆178Updated 3 years ago
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆204Updated last year
- Project to decrypt and parse SSH traffic☆68Updated 4 years ago
- Hfinger - fingerprinting HTTP requests☆139Updated 2 years ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 3 years ago
- ☆308Updated 2 years ago
- A network packet forensics tool for SSH☆252Updated 4 years ago
- ☆169Updated 3 years ago
- Repository for application-layer loop DoS☆32Updated last year
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆82Updated 3 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 4 years ago
- A wireshark/tshark plugin for the JA3 TLS Client Fingerprinting Algorithm☆59Updated 2 years ago
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆133Updated 3 years ago
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆225Updated 4 years ago
- A fast and secure multi protocol honeypot.☆324Updated 3 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆116Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago