salehmuhaysin / TorDetector
This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes
☆9Updated 4 years ago
Alternatives and similar repositories for TorDetector:
Users that are interested in TorDetector are comparing it to the libraries listed below
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 5 years ago
- ☆12Updated 5 years ago
- HoneyDB Python Module☆13Updated last year
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 5 years ago
- ☆22Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Some YARA rules i will add from time to time☆12Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Yara rules☆21Updated 2 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- ☆20Updated 5 years ago
- ☆14Updated 6 years ago