Create a list of bad actors from public IP blacklist.

badactors badactors.py will create a list of about 51,000 de-duplicated bad actors from public IP blacklist for your infosec needs. reallybadactors.py will create a list of about 87,000 de-duplicated bad actors from public IP bl
Information
Category: Python / Security related resources
Watchers: 16
Star: 75
Fork: 38
Last update: Oct 20, 2021

Related Repos



MajorRaccoon RollerScanner RollerScanner — Fast Port Scanner Written On Python Installation You should clone this repository using: git clone https://github.com/Ma
 

Jumbo-WJB PTH Exchange If you only have hash, you can still operate exchange This project module is the same as my other project Exchange_SSRF, This project use
 

S3cur3Th1sSh1t OffensiveVBA In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods and evasion techniques
 

blasty CVE-2021-41773 Playground This is a small Docker recipe for setting up a Debian bookworm based container with an instance of the Apache HTTPd (2.4.49)
 

r0ckysec CVE-2021-22005 - VMWare vCenter Server File Upload to RCE Analyze Usage ------------------------------------------------------------- [*] CVE-2021-220
 

ptswarm This framework helps with Flutter apps reverse engineering using the patched version of the Flutter library which is already compiled and ready for ap
 

Vulnmachines cve-2021-41773 CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49. Follow Twitter YouTube Online learning platform Vulnmachines.com RCE POC
 

justakazh mass_cve-2021-41773 MASS CVE-2021-41773 Screenshot Usage ! python3 -m pip install requests pyyhon3 cve-2021-41773.py urlist.txt pool Note ! results wi
 

p0dalirius ipsourcebypass This Python script can be used to bypass IP source restrictions using HTTP headers. Features 17 HTTP headers. Multithreading. JSON expo
 

BirdSecurity Instagram Exploitation Framework What is IEF? IEF, also known as Instagram Exploitation Framework is as you can tell from the name, it's a exploitatio
 

htrgouvea Lab CVE-2021-41773 Container lab to play/learn with CVE-2021-41773 File disclosure: $ docker build -t apache-default default_conf $ docker run -dit --
 

hashlookup hashlookup-forensic-analyser Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public
 

katiehuangx 📚 How to Create a GitHub Portfolio Hi there, I'm Katie! 🙋🏻‍♀️ This is a fuss-free, simple guide to create your GitHub portfolio. It's perfect for B
 

long2ice alarmer Alarmer is a tool focus on error reporting for your application. Installation pip install alarmer Usage It's simple to integrate alarmer in yo
 

emalderson ThePhish ThePhish is an automated phishing email analysis tool based on TheHive, Cortex and MISP. It is a web application written in Python 3 and base