Tagging and annotation framework for scan data
☆101Oct 16, 2018Updated 7 years ago
Alternatives and similar repositories for ztag
Users that are interested in ztag are comparing it to the libraries listed below
Sorting:
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Jan 23, 2025Updated last year
- **DEPRECATED** This project has been replaced by https://github.com/zmap/zgrab2☆750Jul 7, 2021Updated 4 years ago
- Headless Chrome-based browser☆64Nov 30, 2017Updated 8 years ago
- Command line utility for parsing certificates☆67Feb 17, 2021Updated 5 years ago
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆110Feb 19, 2026Updated last week
- Fast DNS Lookup Library and CLI Tool☆1,091Jan 24, 2026Updated last month
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Sep 20, 2021Updated 4 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- Collects WHOIS details for every IPv4 netblock. Reports supported via Elasticsearch.☆103Oct 30, 2018Updated 7 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Simple SSH brute-forcer written in Go☆24May 29, 2016Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Oct 30, 2013Updated 12 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆27Jun 23, 2016Updated 9 years ago
- Passive Network Audit Framework☆32May 17, 2018Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- ☆12Jun 24, 2017Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM c…☆18Sep 23, 2025Updated 5 months ago
- Tiny Honeypot☆19Aug 9, 2013Updated 12 years ago
- intel amt honeypot☆18May 9, 2017Updated 8 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Dec 9, 2020Updated 5 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- WhichCDN allows to detect if a given website is protected by a Content Delivery Network☆150May 5, 2017Updated 8 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- a small tool to quickly jump between directories☆16Jul 17, 2024Updated last year
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago