jgamblin / badactors
Create a list of bad actors from public IP blacklist.
☆75Updated 6 years ago
Alternatives and similar repositories for badactors:
Users that are interested in badactors are comparing it to the libraries listed below
- Enrich a host with open source security information☆27Updated 9 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Censys.io Python API Search☆42Updated 7 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Simple UDP honeypot script☆48Updated last year
- A Network Inspection Tool☆81Updated 7 years ago
- YAPDNS☆39Updated 9 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Honeypot deployment made easy☆235Updated 5 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- A python multithreaded script to make use of Qualys ssllabs api to test SSL flaws☆40Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Small scripts for doing repeatable tasks☆25Updated 2 years ago
- ☆47Updated 8 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115Updated 8 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 6 years ago
- observation camera honeypot☆50Updated 9 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- Repo for autosnort scripts.☆156Updated 4 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 5 years ago
- VirusTotal tools☆90Updated 4 years ago