ovh / cerberus-ux
☆16Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for cerberus-ux
- Cerberus is a toolkit to receive, parse, process and automate abuse reports handling received by ISP or hosting providers.☆15Updated 5 years ago
- Mass DNS resolution tool☆36Updated 3 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- Monitor the reputation of your IP ranges☆83Updated 5 years ago
- A PAM module to test passwords against previous leaks at haveibeenpwned.com☆36Updated 5 years ago
- More Obvious Webmalware Repository☆15Updated 7 years ago
- server for indexing and querying passive DNS observations☆44Updated 10 months ago
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 10 months ago
- Network Defender Toolkit☆18Updated 11 years ago
- Lafayette is a system to store various email abuse reports sent in ARF.☆75Updated 10 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- A backup system, similar to TimeMachine. Supports encrypted, incremental backups, with filesystem based recovery.☆59Updated this week
- ☆56Updated 7 years ago
- Create an intuitive and interactive graph of a client's IP traffic☆28Updated 6 years ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆13Updated last month
- DNS Looking Glass☆76Updated 4 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆39Updated last month
- I can keep a SSHecret☆66Updated 10 months ago
- DNS Firewall Enforcer☆49Updated 5 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Updated 7 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Full Packet Capture for the Masses☆15Updated 6 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Project infrastructure for FireHOL☆23Updated 3 years ago
- Tor proxy hardware box based on Olimex A20 Lime☆18Updated 8 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 3 years ago
- CSV processing and web related data types mutual conversion☆18Updated last month
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago