janos / compromisedLinks
Compromised/Pwned Passwords API On-premisses
☆24Updated 2 years ago
Alternatives and similar repositories for compromised
Users that are interested in compromised are comparing it to the libraries listed below
Sorting:
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- A low/zero interaction ssh authentication logging honeypot☆22Updated 11 months ago
- Certonid is a Serverless SSH Certificate Authority☆77Updated 3 months ago
- Shell wrapper to run a login shell with `sudo` as the current user for the purpose of audit logging☆95Updated 3 years ago
- A Passive SSH back-end and scanner.☆102Updated 3 weeks ago
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆100Updated last month
- CSP (Content Security Policy) reports server which forwards reports to Elasticsearch.☆57Updated 2 years ago
- Centralized IP reputation daemon☆60Updated 8 months ago
- D4 core software (server and sample sensor client)☆42Updated last year
- A library and a tool for converting audit logs to XML and JSON☆45Updated 7 years ago
- Command line utility for parsing certificates☆64Updated 4 years ago
- Manageable report from lynis text output, in various formats.☆75Updated 3 months ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- IMAP or SMTP honeypot written in Golang☆25Updated 3 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆42Updated 3 weeks ago
- Create Logstash events from the Okta API!☆19Updated 2 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Automated testing, generation & manipulation of #osquery packs☆73Updated 8 months ago
- Entrada - A tool for DNS big data analytics☆49Updated 11 months ago
- The main gravwell monorepo for ingesters and ingest code☆44Updated this week
- Manage, monitor and improve your cyber security posture.☆90Updated 2 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Updated 8 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- A modern arpwatch replacement with JSON formatted outputs and easy options to exec commands when network changes are observed.☆32Updated last year
- CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your…☆101Updated 3 years ago
- Scan domains and return data based on trustworthy email best practices☆209Updated 3 weeks ago
- Hardened debian linux baseimage for Docker.☆40Updated 2 years ago
- A dnstwist wrapper for monitoring for possible typo sqatting/spear phishing domains☆120Updated last year
- RPZ Zone Files to Block DNS-over-HTTPS☆89Updated 3 years ago