A simple, but damn fast sinkhole
☆65Dec 27, 2025Updated 2 months ago
Alternatives and similar repositories for iptrap
Users that are interested in iptrap are comparing it to the libraries listed below
Sorting:
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated last month
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- ☆17Feb 28, 2019Updated 7 years ago
- Adds a guard to disable ObjectInputStream.readObject☆11Dec 6, 2015Updated 10 years ago
- ☆38Aug 22, 2018Updated 7 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Jan 12, 2017Updated 9 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- STIX2 graph widget for Jupyter notebooks, powered by stixview library☆25Jan 7, 2023Updated 3 years ago
- A data engine for Data Oriented Design☆25Apr 19, 2019Updated 6 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Realtime and Online Model Development Framework☆27May 18, 2017Updated 8 years ago
- This is a simple PHP Rss Parser☆13Oct 14, 2015Updated 10 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Library and tools to access the Windows SuperFetch database format☆13Nov 29, 2025Updated 3 months ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- Implementation of "An Optimal Suffix Array Construction Algorithm" described in a Technical Report by Ge Nong☆26Feb 26, 2013Updated 13 years ago
- DNSDB query scripts☆75Jan 23, 2020Updated 6 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- A cryptographically verifiable access control and directory system for Linux servers☆57Jul 6, 2017Updated 8 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 9 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Visualisation for Data scraped from the Spaceapi☆20Feb 27, 2019Updated 7 years ago
- Javascript fast DOM generation☆25Jun 18, 2017Updated 8 years ago
- Phishing Outlook AddIn☆11Nov 16, 2017Updated 8 years ago
- Python API for URL Query☆36May 22, 2016Updated 9 years ago
- Deploy and manage your Freifunk community gateway, mostly compatible with Gluon.☆15Jan 17, 2019Updated 7 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Nov 21, 2016Updated 9 years ago