epix-dev / dns-bhLinks
Proposal of simple DNS blackhole/sinkhole solution based on custom software written in Go and PowerDNS Recursor + LUA plugin.
☆17Updated last year
Alternatives and similar repositories for dns-bh
Users that are interested in dns-bh are comparing it to the libraries listed below
Sorting:
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- ruby library and executable to (de)crypt various router/switch password (IOS, NXOS, JunOS)☆17Updated last year
- NET HEALER receive DDoS Attack reports from FastNetMon collectors allowing custom triggers on a per stage based actions.☆70Updated 9 years ago
- Network Miner generates a network map by sending SNMP requests (LLDP/CDP/EDP).☆39Updated 8 years ago
- Monitor the reputation of your IP ranges☆84Updated 6 years ago
- RouterOS (Mikrotik) Backup over SSH☆18Updated 11 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- Log analysis and SQL storage for Bind DNS server☆36Updated 9 years ago
- My personal scripts.☆45Updated 4 months ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆18Updated 10 years ago
- Advanced Policy Firewall (APF)☆96Updated last year
- RBL lookups with Python☆38Updated 8 years ago
- RPZ Zone Files to Block DNS-over-HTTPS☆89Updated 3 years ago
- rConfig - Network Configuration Management☆102Updated last year
- ☆67Updated 11 months ago
- Intrusion Prevention System (IPS) for Secure Shell (SSH)☆51Updated 12 years ago
- Simple shell scripts for DNS and DNSSEC monitoring☆18Updated 3 years ago
- A simple log parser for Suricata log file (JSON)☆9Updated 2 years ago
- Selective DNS proxy forwarding based on DNS threat blocking providers intelligence.☆56Updated 7 years ago
- Python script that parses a Cisco IOS configuration file and generates a report to efficiently perform an IT Security Audit☆37Updated 6 years ago
- Set of CLI tools to transform ModSecurity logs into a meaningful information, given a context.☆53Updated 2 years ago
- DDoS mitigation using null routing☆47Updated 6 months ago
- AbuseIO is a toolkit to receive, process, correlate and notify about abuse reports received by network operators, typically hosting and a…☆223Updated 2 months ago
- Passwords of SSH Intruders Transferred to Text☆157Updated last year
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆50Updated 4 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆110Updated 6 months ago
- A network security policy compiler. Netspoc is targeted at environments with a large number of firewalls and admins. Firewall rules are d…☆72Updated last week
- The Zonemaster GUI - part of the Zonemaster project☆16Updated last month
- A firewall management system.☆89Updated 3 months ago