PhreakScan is the premiere repository of interesting telephone numbers on the net. By phreaks, for phreaks.
Given an IP address (by default, yours), it scans the BitTorrent network for the torrents it may have downloaded recently.
I wrote Trunk Recorder because I was curious about what my local fire station was up to and I put together the original version of OpenMHz because I figured other people might want to listen to the recordings too.
The latest version of this site makes it easy for other people running Trunk Recorder to share their recordings. I am hoping that making it easier to listen to what our local fire, police and EMS have to go through everyday will lead to a greater appreciation for all the work they do, which goes largely unseen.
The audio from each system is archived for 30 days, so you can go back and listen to events you may have missed.
Github: https://github.com/openmhz
Transcription of calls from trunk-recorder using OpenAI Whisper.
If you're using OpenAI Whisper, you can use a local GPU to accelerate computations.
Trunk Recorder is able to record the calls on trunked and conventional radio systems. It uses 1 or more Software Defined Radios (SDRs) to do this. The SDRs capture large swathes of RF and then use software to process what was received. GNU Radio is used to do this processing because it provides lots of convenient RF blocks that can be pieced together to allow for complex RF processing. The libraries from the amazing OP25 project are used for a lot of the P25 functionality. Multiple radio systems can be recorded at the same time.
Trunk Recorder currently supports the following:
IVRE (Instrument de veille sur les réseaux extérieurs) is a network recon framework, including tools for passive and active recon. IVRE can use data from numerous passive sensors and active scanning tools. You can think of it as a self-hosted and fully-controlled alternative to Shodan / ZoomEye / Censys, GreyNoise, and more. In the AUR.
NETINT
BBOT is a recursive, modular OSINT framework written in Python. It is capable of executing the entire OSINT process for entire domains in a single command, including subdomain enumeration, port scanning, web screenshots (with its gowitness module), vulnerability scanning (with nuclei), and much more.
BBOT currently has over 50 modules and counting.
Requires Python v3.9.x or later.
This tool aims at accumulating javascript files from a given set of subdomains to discover hidden API endpoints. It swims through JS files to find more JS files. It also creates a target-specific wordlist from the JS-files for further content discovery, appends new subdomains discovered from the JS files to the user specified subdomain file, and dumps all the discovered JS files neatly in a folder for static analysis.
It seems to set up a bunch of other tools and grinds up their output.
A fast, simple, easy to use multithreaded port scanner. Looks like it's written in pure Python. TCP only right now.
Looks like it could be a useful code reference, too.
When performing passive recon on a target, there are dozens of tools we can use to gather various pieces of intel on our target. This tool will allow us to parse these utilities easily.
FullHunt is the attack surface database of the entire Internet. FullHunt enables companies to discover all of their attack surfaces, monitor them for exposure, and continuously scan them for the latest security vulnerabilities. All, in a single platform, and more. Seems to share functionality with SHODAN in this regard.
REST API: https://api-docs.fullhunt.io/
Free tier: API access, 1K searches per month, 30 results, basic search filters.
A Voip Wardialer for the phreaking of 2020.
An archive of phreak programs for Atari, Commodore, Tandy and more.
ONYPHE is a search engine for open-source and cyber threat intelligence data collected by crawling various sources available on the Internet or by listening to Internet background noise. ONYPHE correlates this information with data gathered by performing active Internet scanning for connected devices. It then normalizes information and make it available via an API and its search language.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. Some of this stuff can be used to prime discovery operations.
Homepage of the PLA. Fun stuff, here!
Clair is a FOSS utility for conducting static security analysis of Linux containers, Docker containers in particular. Clair continually updates its internal index of known vulnerabilities so it can keep constant watch over what it monitors. Has a modular architecture to make it easier to extend the project without having to fork() it. Also designed to fit into a CI/CD pipeline to monitor in-house containers as they're built. Plugs into Kubernetes. Requires Postgres. Written in Go. sysadmin infosec scanner scanning