salehmuhaysin / TorDetectorLinks
This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes
☆9Updated 5 years ago
Alternatives and similar repositories for TorDetector
Users that are interested in TorDetector are comparing it to the libraries listed below
Sorting:
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Event Data Collector☆37Updated last month
- ☆22Updated 4 years ago
- ☆14Updated 7 years ago
- various slides and presentations I've worked on☆19Updated 2 months ago
- C# User Simulation☆32Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 5 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 5 years ago
- Miscellaneous for various things☆20Updated 6 months ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- ☆11Updated 6 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated 10 months ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago