Create a list of bad actors from public IP blacklist.
☆75Jul 13, 2018Updated 7 years ago
Alternatives and similar repositories for badactors
Users that are interested in badactors are comparing it to the libraries listed below
Sorting:
- Python Script to Check IP Against Blacklist☆222Dec 10, 2025Updated 2 months ago
- Censys.io Python API Search☆43May 3, 2017Updated 8 years ago
- Curl Script To Change User Agent☆60Oct 5, 2016Updated 9 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16May 12, 2015Updated 10 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Jun 1, 2015Updated 10 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- ☆23Jul 7, 2020Updated 5 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- Python tool build around GreyNoise's alpha/public API☆11Dec 20, 2018Updated 7 years ago
- ☆10May 8, 2016Updated 9 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- Generic script to load ipsets from iblocklist.com☆14Jun 7, 2017Updated 8 years ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- ☆12Sep 11, 2014Updated 11 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Small utility to generate complicated passwords - version with GUI☆19Nov 19, 2017Updated 8 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Jul 1, 2016Updated 9 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Jun 4, 2011Updated 14 years ago
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandbox☆38Oct 9, 2015Updated 10 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- ☆84May 19, 2015Updated 10 years ago
- Yara syntax highlighting☆25Sep 4, 2021Updated 4 years ago
- first commit☆23Feb 16, 2026Updated 2 weeks ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Exploits I've authored☆60Aug 13, 2019Updated 6 years ago
- Volatility plugins developed and maintained by the community☆21Sep 18, 2024Updated last year
- A web application for running shell commands interactively on your server☆21Dec 22, 2016Updated 9 years ago
- Anubis Malware Samples☆20Dec 19, 2021Updated 4 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Oct 6, 2017Updated 8 years ago