jedisct1 / massresolver
Mass DNS resolution tool
☆36Updated 4 years ago
Alternatives and similar repositories for massresolver:
Users that are interested in massresolver are comparing it to the libraries listed below
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 9 years ago
- Host files with DNS☆32Updated 9 years ago
- Simple install script for Snort/Bro IDS with JSON logging on FreeBSD☆18Updated 8 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆17Updated 8 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆39Updated 4 months ago
- Enrich a host with open source security information☆27Updated 9 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- DNS zone transfer research☆58Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- YAPDNS☆39Updated 9 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 10 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆106Updated last year
- Threatbutt python client and Maltego transforms☆51Updated 8 months ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Plugins written for CVE-Search☆25Updated 3 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- A simple, but damn fast sinkhole☆64Updated 3 months ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago