hdm / inetdata-parsers
Internet data processing tools
☆55Updated 4 years ago
Alternatives and similar repositories for inetdata-parsers:
Users that are interested in inetdata-parsers are comparing it to the libraries listed below
- Internet data acquisition☆149Updated 4 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated last year
- Low-Impact Fingerprint Tool☆59Updated last year
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆23Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- A simple, but damn fast sinkhole☆64Updated 2 months ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated last year
- Passive DNS V2☆62Updated 10 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- Universal Honey Pot☆31Updated 2 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆43Updated 8 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Threatbutt python client and Maltego transforms☆51Updated 7 months ago
- ☆22Updated 7 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- DNSDB query scripts☆75Updated 5 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- tundeep☆43Updated 5 years ago
- YETI is a TAXII implementation☆46Updated 5 years ago
- ☆22Updated this week
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago