netsniff-ng
dnstwist
netsniff-ng | dnstwist | |
---|---|---|
2 | 23 | |
1,177 | 4,550 | |
2.3% | - | |
0.0 | 7.6 | |
over 1 year ago | about 1 month ago | |
C | Python | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
netsniff-ng
-
What is the correct way to do a git pull, ./configure, make, make install within a dockerfile?
RUN apt-get update && \ apt-get install -y iproute2 iputils-ping iperf3 tcpdump netcat ethtool \ mtr iftop nmap python3 python3-pip joe nano ccache flex bison libnl-3-dev \ libnl-genl-3-dev libnl-route-3-dev libgeoip-dev libnetfilter-conntrack-dev \ libncurses5-dev liburcu-dev libnacl-dev libpcap-dev zlib1g-dev libcli-dev \ libnet1-dev git RUN pip3 install ncclient requests scapy iperf3 RUN mkdir -p python_scripts/ \ mkdir -p packet_samples/ RUN git clone https://github.com/netsniff-ng/netsniff-ng.git COPY packet_samples/ packet_samples/ ADD python_scripts/iperf3_docker_client.py python_scripts/iperf3_docker_client.py ADD python_scripts/iperf3_docker_server.py python_scripts/iperf3_docker_server.py ADD python_scripts/ping_test.py python_scripts/ping_test.py RUN /netsniff-ng/configure WORKDIR /netsniff-ng RUN /netsniff-ng/configure && \ make && \ make install && WORKDIR / ENTRYPOINT ["/bin/bash"]
-
Awesome Penetration Testing
netsniff-ng - Swiss army knife for network sniffing.
dnstwist
- Have I Been Squatted?
-
Domain Permutation - HaveIBeenSquatted & dnstwist
I recently stumbled upon 2 cool domain permutation tools: HIBS & dnstwist
-
Accounting got phished. Paid out big bucks
https://dnstwist.it/ - check your domain now
-
Phishing campaign defence advice
You can hunt down evil twin domains with https://dnstwist.it/
- adjacent domain names
- Alternative To Domain Tools
-
Typosquatting list
I periodically run dnstwist and add whatever it finds to our block list.
- List of 26 services for OSINT | BLUE TEAMS | RED TEAMS
-
God damn. In situations like this how can I detect the fake one? This is truly scary.
Pi-hole (with every reasonable blocklist I can find) protects me from many of these domains. NextDNS would be another option for DNS-based blocking for people who don't want to administer it themselves. I also plan to use DNSTwist to generate additional blocklists for typo-based phishing that I can plug into the Pi-hole for important sites.
- Google Search Ads showing fake bitwarden web vault site as top result.
What are some alternatives?
masscan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
opensquat - The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonating legit domains.
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
dnschef - DNSChef - DNS proxy for Penetration Testers and Malware Analysts
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
urlcrazy - Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
etl2pcapng - Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.
octoDNS - Tools for managing DNS across multiple providers
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
amass - In-depth attack surface mapping and asset discovery
pwntools - CTF framework and exploit development library
WhatBreach - OSINT tool to find breached emails, databases, pastes, and relevant information