Tool for automatic list generation of known TOR and VPN exit nodes
☆29Dec 21, 2023Updated 2 years ago
Alternatives and similar repositories for exitgather
Users that are interested in exitgather are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Apr 10, 2024Updated last year
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Mar 2, 2026Updated 3 weeks ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- A Python implementation of our efficient Bloom filter library.☆29Feb 27, 2020Updated 6 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- External twitter feeder for AIL framework☆16Apr 16, 2023Updated 2 years ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 8 months ago
- Dockerized eMobility for use in T-Pot☆18Oct 23, 2017Updated 8 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆42Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- TAPIR is a multi-user, client/server, incident response framework☆47Jul 7, 2022Updated 3 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆100Mar 6, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Python library for the ArcSight logger REST API☆27Sep 30, 2021Updated 4 years ago
- ☆13May 27, 2020Updated 5 years ago
- USB Scanning device☆34Sep 16, 2025Updated 6 months ago
- Website for ail-typo-squatting library☆72Feb 25, 2026Updated last month
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 11 months ago
- Capture a URL with Playwright☆30Updated this week
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Trident is a trusted and secure communication platform for enabling better communication between groups of trusted parties☆22Apr 17, 2025Updated 11 months ago