Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps and threat intelligence data.
☆52Aug 10, 2018Updated 7 years ago
Alternatives and similar repositories for OpenPiMap
Users that are interested in OpenPiMap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analyzes traffic via netflow or live capture and graphs ASN's☆20Sep 26, 2023Updated 2 years ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- Утилиты и скрипты для MS SQL Server DBA☆16Oct 24, 2020Updated 5 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 5 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Automated SonarQube☆70Jun 3, 2019Updated 6 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Dump messages and media info from list of Telegram channels to CSV and monitor for changes☆31Jan 21, 2020Updated 6 years ago
- Official payload library for the O.MG line of products from Mischief Gadgets☆12Sep 18, 2023Updated 2 years ago
- Script which display image (ad) downloaded from the internet.☆13Feb 2, 2020Updated 6 years ago
- ☆13Feb 29, 2020Updated 6 years ago
- Haunter Asset Pack for Flipper Zero☆11May 10, 2024Updated last year
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Firefox Addon to fool websites with spoofed X-Forwarded-For headers☆18Oct 13, 2013Updated 12 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- Haxmas-2017 LD_PRELOAD rootkit in Golang☆19Dec 28, 2017Updated 8 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Life OpSec Guide on how to stay more anonymous, private, and secure in life. Take greater procatuations, and quit being tracked and mass …☆14Oct 20, 2022Updated 3 years ago
- Collects all Discord server member data and exports to an Excel spreadsheet and also to an HTML file with avatars displayed☆11Jul 8, 2023Updated 2 years ago
- a brainfuck interpreter written in bash☆14Apr 22, 2016Updated 9 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Networking IDS , network traffic classification with ML. Final Project for ECE-417.☆14Jan 21, 2020Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Dec 9, 2017Updated 8 years ago
- ☆16Aug 5, 2022Updated 3 years ago
- A shell script that grabs the latest Spamhaus DROP List and adds it to iptables.☆53Mar 1, 2019Updated 7 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆18Jul 10, 2018Updated 7 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Simple web frontend to an elasticsearch database made for local files indexing☆19Oct 25, 2019Updated 6 years ago
- Ipython notebook that illustrates effectiveness of machine learning algorithms in anomaly detection of netflow data (inbound/outbound DDo…☆80May 7, 2017Updated 8 years ago