duggytuxy / Data-Shield_IPv4_BlocklistView external linksLinks
Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuously, this resource offers vital threat intelligence to bolster your Firewall and WAF instances,...
☆401Feb 7, 2026Updated last week
Alternatives and similar repositories for Data-Shield_IPv4_Blocklist
Users that are interested in Data-Shield_IPv4_Blocklist are comparing it to the libraries listed below
Sorting:
- SwitchToOpen - The open source shift☆307Nov 21, 2025Updated 2 months ago
- Speed up your pentest enumeration☆82Oct 5, 2025Updated 4 months ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆129Dec 15, 2025Updated last month
- Protect your data in minutes !☆127Nov 5, 2024Updated last year
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆330Feb 3, 2026Updated last week
- Captures network traffic app made in Rust.☆76Feb 4, 2026Updated last week
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated 10 months ago
- GLPI vulnerabilities checking tool☆157Dec 4, 2025Updated 2 months ago
- ☆39Oct 18, 2024Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- HTTP-BROWSER layer 7 attack method bypassing Cloudflare JS Challenges and HTTP-DDOS ruleset.☆11Jan 30, 2024Updated 2 years ago
- Assess the security of your Active Directory with few or all privileges.☆341Jan 31, 2026Updated last week
- Generate a simple static report for DNS blocklists or see previous reports of requested blocklists.☆17Nov 24, 2025Updated 2 months ago
- Mapping the information system / Cartographie du système d'information☆470Updated this week
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- A list of malicious IP addresses associated with botnets, cyberattacks, and the generation of artificial traffic on websites. Useful for …☆39Updated this week
- IP block lists for: Malware, Bots, Hackers, scanners, etc.☆190Updated this week
- ☆44Jan 22, 2026Updated 3 weeks ago
- Manually curated IP Blocklist. Recommended only to update your firewalls weekly with this list. Please read how to use before implementin…☆24Nov 17, 2025Updated 2 months ago
- Machine-readable .txt IP blocklist from ThreatFox by Abuse.ch, updated every hour.☆50Updated this week
- ☆317Mar 26, 2024Updated last year
- Proxmark guide☆19Feb 7, 2025Updated last year
- Cerberus is a Python client-server program to implement a complex port knocking system preventing playback attacks on an exposed server.☆74Jul 16, 2024Updated last year
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆528Jul 31, 2024Updated last year
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- Guide journalisation Microsoft☆69Feb 3, 2026Updated last week
- Outil de récupération automatique des données AZure / Automated tool for dumping Azure configuration data☆21Nov 13, 2025Updated 3 months ago
- ☆56Jan 22, 2025Updated last year
- Proxmox VE control CLI☆71Jul 9, 2025Updated 7 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 7 months ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆456Oct 16, 2025Updated 3 months ago
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,570Updated this week
- ☆27Jul 2, 2024Updated last year
- INVENTORY é um painel web que exibe dados extraídos da API do Wazuh, via SysCollector. A solução oferece acesso rápido a detalhes do sis…☆45Jan 1, 2026Updated last month
- ☆703Jun 19, 2024Updated last year
- ☆65Apr 28, 2024Updated last year
- VolchockC2 is a custom-built Command & Control (C2) framework, currently under active development. Designed for red team operations and a…☆32Jul 31, 2025Updated 6 months ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆437Oct 4, 2025Updated 4 months ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago