inetrg / spoki
Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"
☆17Updated last year
Related projects: ⓘ
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- ☆17Updated this week
- Python framework for manipulating bulk WHOIS data from RIRs☆19Updated 2 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- GO sandbox to run untrusted code☆40Updated 4 years ago
- lightweight CVE search☆21Updated last year
- E4's C2 server☆19Updated 3 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆38Updated 4 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 5 years ago
- Small Helper Library to increase automatically the file descriptors limits for the current process☆21Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆30Updated 6 years ago
- A TCP service multiplexer☆18Updated 7 years ago
- Yet Another Vulnerability Database☆14Updated 3 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- Historical Tracking of MAC Address Assignments☆30Updated this week
- Hybrid memory/disk map☆47Updated this week
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 3 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Golang Tool to interact with Launchd and other services with XPC☆27Updated 4 years ago
- Vulnerable XSLT Console Application☆10Updated 6 years ago
- Custom semgrep rules registry☆12Updated 2 years ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 4 years ago
- CLI and Go package for fast, offline ASN lookups☆14Updated last year
- Import and display Masscan data☆32Updated 9 months ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- the puppy proxy☆21Updated 4 years ago