Tool for automatic list generation of known TOR and VPN exit nodes
☆30Dec 21, 2023Updated 2 years ago
Alternatives and similar repositories for exitgather
Users that are interested in exitgather are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Apr 10, 2024Updated 2 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆24Mar 2, 2026Updated 2 months ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Apr 18, 2026Updated 2 weeks ago
- A Python implementation of our efficient Bloom filter library.☆29Feb 27, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- External twitter feeder for AIL framework☆16Apr 16, 2023Updated 3 years ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 9 months ago
- Dockerized eMobility for use in T-Pot☆18Oct 23, 2017Updated 8 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆48Updated this week
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 10 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- AIL project training materials☆39Apr 21, 2026Updated 2 weeks ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- TAPIR is a multi-user, client/server, incident response framework☆47Jul 7, 2022Updated 3 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆103Apr 27, 2026Updated last week
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Python library for the ArcSight logger REST API☆27Sep 30, 2021Updated 4 years ago
- ☆13May 27, 2020Updated 5 years ago
- USB Scanning device☆34Apr 15, 2026Updated 3 weeks ago
- Website for ail-typo-squatting library☆73Feb 25, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated last year
- Capture a URL with Playwright☆31Updated this week
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 11 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago