eddie4 / geoip-attack-mapLinks
Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.
☆10Updated 4 years ago
Alternatives and similar repositories for geoip-attack-map
Users that are interested in geoip-attack-map are comparing it to the libraries listed below
Sorting:
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆19Updated 3 weeks ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- ☆24Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- ☆28Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 10 months ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- Enumeration & fingerprint tool☆24Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last month
- ☆17Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 7 months ago
- Forensic Imaging quickstarts!☆14Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆30Updated 6 months ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆34Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago