digininja / scanner_user_agentsLinks
A list of user agents belonging to common web scanners.
☆40Updated 3 years ago
Alternatives and similar repositories for scanner_user_agents
Users that are interested in scanner_user_agents are comparing it to the libraries listed below
Sorting:
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 4 years ago
- ☆15Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 4 years ago
- ☆33Updated last year
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- URL fingerprinting made easy☆90Updated last year
- AIL project training materials☆39Updated 6 months ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆56Updated 3 weeks ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆48Updated 2 years ago
- Reconnaissance tool for GitLab and GitHub organizations☆53Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆33Updated 7 months ago
- An nmap script to produce target lists for use with various tools.☆33Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆34Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Updated 4 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago