breakerspace / weaponizing-censorsLinks
censors pose a threat to the entire Internet
☆140Updated 4 years ago
Alternatives and similar repositories for weaponizing-censors
Users that are interested in weaponizing-censors are comparing it to the libraries listed below
Sorting:
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆188Updated this week
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆134Updated 3 weeks ago
- packet captures of real-world ddos attacks☆165Updated 2 months ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆117Updated 2 months ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆132Updated 2 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆120Updated 2 weeks ago
- Repository for application-layer loop DoS☆33Updated last year
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆77Updated 2 years ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- Hfinger - fingerprinting HTTP requests☆141Updated 2 years ago
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆210Updated last year
- A fast and secure multi protocol honeypot.☆326Updated 3 years ago
- NIST-based CVE lookup store and API powered by Rust.☆136Updated 3 months ago
- A network packet forensics tool for SSH☆254Updated 4 years ago
- Passive DNS Capture and Monitoring Toolkit☆348Updated last week
- ☆170Updated 3 years ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆82Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 5 years ago
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆137Updated 3 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆101Updated 4 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆100Updated last week
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆121Updated last year
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 6 years ago
- SI6 Networks' IPv6 Toolkit☆278Updated last year
- Vault Exploit Defense☆127Updated last year
- The TLS-Scanner Module from TLS-Attacker☆281Updated 3 months ago