Prototype system to monitor BGP routes and alert when anomalies are identified
☆15Dec 7, 2018Updated 7 years ago
Alternatives and similar repositories for bgp-watcher
Users that are interested in bgp-watcher are comparing it to the libraries listed below
Sorting:
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆12Feb 10, 2013Updated 13 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- Manage your security groups using the API gateway and Lambda☆17Oct 21, 2016Updated 9 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Scans NTP servers for CVE-2013-5211 NTP DDOS amplification vulnerability.☆15Sep 7, 2014Updated 11 years ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆41Nov 7, 2023Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Docker setup for running nfsen-ng (Netflow visualizer) and nfdump (Netflow collector) together.☆20Jan 22, 2021Updated 5 years ago
- Load Balancer which can load balance any UDP service☆16Nov 27, 2019Updated 6 years ago
- A simple python script used to generate bit flipped versions of domain names☆23Mar 12, 2021Updated 4 years ago
- This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.☆21Jun 2, 2021Updated 4 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- Making transparency normal!☆24Dec 18, 2023Updated 2 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Sep 11, 2025Updated 5 months ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Manito Networks Flow Analyzer☆55Feb 21, 2017Updated 9 years ago
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Dec 25, 2015Updated 10 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Windows anti-forensics USB monitoring tool.☆69Feb 17, 2023Updated 3 years ago
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Tool to make in memory man in the middle☆125Oct 8, 2018Updated 7 years ago
- A list of user agents belonging to common web scanners.☆40Jun 27, 2022Updated 3 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Command line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It c…☆34Aug 1, 2022Updated 3 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆42Nov 29, 2025Updated 3 months ago
- ☆76May 23, 2024Updated last year
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago