lilydjwg / dnssnoopLinks
show which process did what DNS queries
☆36Updated 7 years ago
Alternatives and similar repositories for dnssnoop
Users that are interested in dnssnoop are comparing it to the libraries listed below
Sorting:
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆37Updated 2 years ago
- ☆65Updated 5 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆60Updated 2 weeks ago
- Proof of concept for vulnerability management of Docker containers☆16Updated 8 years ago
- A place to share my lnav .json formats. For more information on the incredible Log Navigator, visit http://lnav.org☆25Updated 2 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- Minimalistic DNS logging tool☆43Updated 3 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 5 years ago
- ☆27Updated 9 years ago
- Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)☆10Updated 5 years ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆16Updated 3 months ago
- A CLI tool to automate common Confluence maintenance tasks and content publishing.☆22Updated 5 years ago
- Historical Tracking of MAC Address Assignments☆39Updated this week
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- detects several virtualizations☆45Updated 10 years ago
- DNS Firewall Enforcer☆50Updated 6 years ago
- history for netstat☆99Updated 3 years ago
- Example of Linux SO_REUSEPORT☆91Updated 8 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆63Updated 4 years ago
- I can keep a SSHecret☆71Updated last year
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- Convert a list of IP addresses/ranges to their minimized cidr form☆39Updated 10 years ago
- Faraday's Command Line Interface☆51Updated 3 months ago
- Grab ssh keys from ssh-agent☆221Updated 5 years ago
- socat version 2☆10Updated 13 years ago
- masscan result parsing, web server fingerprinting☆17Updated 3 years ago
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆67Updated 14 years ago
- Command line utility for parsing certificates☆66Updated 4 years ago