RACE is an open source project aimed at developing technologies to provide metadata-anonymous, secure, and resilient messaging for users around the world. RACE provides anonymity by routing messages through an overlay network of volunteer servers using cryptographic algorithms that prevent a malicious subset of these servers from determining who is messaging whom. RACE uses specialized networking protocols to prevent connections between individual members of the network from being detected or blocked. RACE is built to run in a dockerized linux environment and on Android devices.
A quick post today showing some different ways to block visitors via their IP address. This can be useful for a variety of reasons, including stopping some stupid script kiddie from harassing your site, or preventing some creepy stalker loser from lurking around your forums, or even silencing the endless supply of angry trolls that never seem to get a clue. So many reasons why, and so many ways to block them.
The FCC, some FAANGs, and others are motivated to see more innovation in the wireless space to try to see what new tech can come about. Unfortunately, the expertise is surrounded in jargon, domain and tribal knowledge, and can be very frustrating for someone who wants to take the shortcut route to running a mobile network. I aim to try to cut through a lot of the jargon and extra stuff that can get a person lost between the the excitement of operating a mobile network and manifesting it into physical reality.
I had a lot of exposure to testing early stage LTE/5G networks. My motivation is to try to demystify as much of the mobile network as I can for anyone with a strong networking but non-wireless focused background.
SSH-Snake is a powerful tool designed to perform automatic network traversal using SSH private keys discovered on systems, with the objective of creating a comprehensive map of a network and its dependencies, identifying to what extent a network can be compromised using SSH and SSH private keys starting from a particular system.
SSH-Snake can automatically reveal the relationship between systems which are connected via SSH, which would normally take a tremendous amount of time and effort to perform manually. It's completely self-replicating and self-propagating -- and completely fileless. In many ways, SSH-Snake is actually a worm: It replicates itself and spreads itself from one system to another as far as it can. SSH-Snake takes a depth-first approach to discovery: once it connects to one system, it tries to connect further from that system before backtracking.
This document describes technical mechanisms employed in network censorship that regimes around the world use for blocking or impairing Internet traffic. It aims to make designers, implementers, and users of Internet protocols aware of the properties exploited and mechanisms used for censoring end-user access to information. This document makes no suggestions on individual protocol considerations, and is purely informational, intended as a reference. This document is a product of the Privacy Enhancement and Assessment Research Group (PEARG) in the IRTF.
Tells you your IP address and assorted other web browser-related information. Also has a simple, cURL friendly API that supports multiple data formats.
IVRE (Instrument de veille sur les réseaux extérieurs) is a network recon framework, including tools for passive and active recon. IVRE can use data from numerous passive sensors and active scanning tools. You can think of it as a self-hosted and fully-controlled alternative to Shodan / ZoomEye / Censys, GreyNoise, and more. In the AUR.
NETINT
TMTP is a new Internet protocol combining elements of email and the web. TMTP offers a simple, reliable, free, secure, decentralized method for messaging & correspondence & notification.
Online services lack a way to directly message their customers/members. Email (SMTP etc) is unreliable, insecure, and typically transits multiple third-party hosts between sender & recipient. (Email also has other painful problems!) Text messaging (SMS) is expensive. Some sites patch this gap by building & maintaining custom phone apps—at great cost.
The client and server are open source, subject to the terms of the Mozilla Public License, v2.0.
A crowd-sourced guide to help techs help their non-tech spouses / partners / parents / kids when we are at the end-of-life.
BBOT is a recursive, modular OSINT framework written in Python. It is capable of executing the entire OSINT process for entire domains in a single command, including subdomain enumeration, port scanning, web screenshots (with its gowitness module), vulnerability scanning (with nuclei), and much more.
BBOT currently has over 50 modules and counting.
Requires Python v3.9.x or later.
An awesome list of resources to design, implement and operate computer networks.
Why should security vendors be the only ones allowed to use silly, animated visualizations to "compensate"? Now, you can have your very own IP attack map that's just as useful as everyone else's.
IPew is a feature-rich, customizable D3 / javascript visualization, needing nothing more than a web server capable of serving static content and a sense of humor to operate. It's got all the standard features that are expected, plus sound effects!
Looking through the index.html file it looks like the specifics should be pretty easy to tweak. The cute attack names are in an array, as are the sound effects (which can be swapped out or otherwise modified fairly easily). I think the stats used to influence the random number generator could be modified to reflect other uses of this map. Similarly, the CSV files could be altered or swapped out.
To run it, just point a web server at the repository. No back-end webshit involved.
Tulip is an information visualization framework dedicated to the analysis and visualization of relational data. Tulip aims to provide the developer with a complete library, supporting the design of interactive information visualization applications for relational data that can be tailored to the problems he or she is addressing.
Written in C++ the framework enables the development of algorithms, visual encodings, interaction techniques, data models, and domain-specific visualizations. One of the goal of Tulip is to ease the reuse of components and allows the developers to focus on programming their application. This development pipeline makes the framework efficient for research prototyping as well as the development of end-user applications.
Graph-tool is an efficient Python module for manipulation and statistical analysis of graphs and networks. Contrary to most other Python modules with similar functionality, the core data structures and algorithms are implemented in C++, making extensive use of template metaprogramming, based heavily on the Boost Graph Library. This confers it a level of performance that is comparable (both in memory usage and computation time) to that of a pure C/C++ library. Conveniently draw your graphs, using a variety of algorithms and output formats (including to the screen). Graph-tool has its own layout algorithms and versatile, interactive drawing routines based on cairo and GTK+, but it can also work as a very comfortable interface to the excellent graphviz package.
Source code: https://git.skewed.de/count0/graph-tool
A cross-platform, user-friendly free software application for social network analysis and visualization. Draw social networks with a few clicks on a virtual canvas, load field data from a file in a supported format. Edit actors and ties through point-and-click, analyse graph and social network properties, produce beautiful HTML reports and embed visualization layouts to the network.
A directory of tools for domain, network, and PII reconaissance. Includes some Google searching tricks.
tfviz analyzes Terraform deployment files and generates maps which depict what it's going to do in production. Right now it only works with AWS environments.
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
A website that can extract many different sorts of information pertaining to IP addresses and networks, least of all querying several dozen blacklists to see if an address has been flagged as a spammer's.