hasameli / foghornLinks
The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS greylisting
☆139Updated 8 years ago
Alternatives and similar repositories for foghorn
Users that are interested in foghorn are comparing it to the libraries listed below
Sorting:
- a grep -r for secrets☆178Updated 3 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆239Updated 9 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- Collection of IOCs related to targeting of civil society☆189Updated 3 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- builds database/visualizations of LAN structure from passively sifted information☆148Updated 11 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Threatbutt Suite☆37Updated 10 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Transparent network tap☆119Updated 9 years ago
- Honeynet Project generic authenticated datafeed protocol☆216Updated last year
- Threatbutt python client and Maltego transforms☆51Updated last year
- SIFT Bootstrap Script☆145Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- A simple, but damn fast sinkhole☆65Updated 9 months ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆336Updated 8 years ago
- Kvasir: Penetration Test Data Management☆430Updated 6 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆201Updated 9 years ago
- F-Secure Virus World Map / Console Edition☆70Updated 12 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- Enrich a host with open source security information☆27Updated 10 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆104Updated 7 years ago
- Repo for autosnort scripts.☆157Updated 4 years ago
- Repo for the Open Source version of NOVA☆77Updated 2 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago