iclab / centinel
☆35Updated 3 years ago
Alternatives and similar repositories for centinel:
Users that are interested in centinel are comparing it to the libraries listed below
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated 2 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 6 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Advices to look for malicious software on your devices☆17Updated 4 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Every document published from the Snowden archive☆68Updated 10 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆77Updated last year
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- ☆37Updated 10 years ago
- Collection of data about URL filtering in various countries☆42Updated 8 years ago
- Planning for next generation secure chat.☆37Updated 10 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Passive DHCP fingerprinting implementation☆51Updated 8 years ago
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- Server & client software for Firewall Cafe☆3Updated last month
- PANORAMIX repo☆20Updated 2 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆107Updated last year
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated 3 months ago
- ☆32Updated 10 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆18Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Web crawling and document processing through a usable interface.☆71Updated 7 years ago
- Baseline organizational policies and practices☆10Updated 8 years ago
- Network Tools☆32Updated last year
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- HTTP host monitoring and management through DNS☆10Updated 3 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago