High performance search for IP addresses and CIDR ranges
☆34Feb 4, 2026Updated last month
Alternatives and similar repositories for grepcidr3
Users that are interested in grepcidr3 are comparing it to the libraries listed below
Sorting:
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆39Sep 21, 2023Updated 2 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 8 months ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- A malicious BGP daemon that forces a TCP zero window edge case☆20Apr 21, 2021Updated 4 years ago
- Check if IP address is part of AWS infrastructure☆18Dec 2, 2020Updated 5 years ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Jun 11, 2025Updated 8 months ago
- LUKS Remote Key Unlock (luksrku) is a client/server utility that allows to remotely unlock LUKS (root) filesystems using TLS☆25Feb 16, 2026Updated 3 weeks ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- ☆25Jun 15, 2025Updated 8 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- MIMEDefang is an e-mail filtering tool that works with the Sendmail “Milter” library. MIMEDefang lets you express your filtering policie…☆31Feb 26, 2026Updated last week
- ☆29Jan 19, 2023Updated 3 years ago
- BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a …☆32May 22, 2023Updated 2 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- CSU's BGP Observatory code (bgpmon/pheme)☆29Jul 30, 2019Updated 6 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Sirve para ver las peticiones entre el navegador y el servidor pero en el caso del internet gratis a través de vpn también los puede ayud…☆11Oct 1, 2021Updated 4 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Rumble Mod for the Steam Deck. See here for the Decky Plugin: https://github.com/dawidmpunkt/RumbleDeck☆16Sep 10, 2025Updated 5 months ago
- A basic Python code for sorting steam games based on how long to beat☆10Nov 19, 2023Updated 2 years ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆41Nov 7, 2023Updated 2 years ago
- from http://www.pc-tools.net/unix/grepcidr/☆90Apr 26, 2017Updated 8 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Peer-to-peer NATS message routing and S3 object sync solution☆18Feb 5, 2026Updated last month
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- ☆10Jun 27, 2024Updated last year
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- A running list of applications and processes that just do not work with the total absence of IPv4 on on a host☆16Aug 5, 2023Updated 2 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- 🎮 Real-time game subtitle translator with AI-powered OCR. Context-aware translation for 20+ languages. Free offline models + dirt cheap …☆35Feb 20, 2026Updated 2 weeks ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Utility to convert Junos configuration into a jinja2 template☆11Jan 19, 2017Updated 9 years ago
- A database of currently available 35mm, 110 and medium format film stocks.☆11Feb 24, 2026Updated last week