This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# https://www.iana.org/domains/root/db | |
# https://data.iana.org/TLD/tlds-alpha-by-domain.txt | |
# Version 2017031800, Last Updated Sat Mar 18 07:07:01 2017 UTC | |
AAA | |
AARP | |
ABARTH | |
ABB | |
ABBOTT | |
ABBVIE | |
ABC |
- https://www.snort.org/downloads/community/community-rules.tar.gz
Beware, around 2600/3500 rules are not active by default.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Dictionnaire des prénoms attribués aux enfants nés en France et en départements d'outre-mer entre 1900 et 2015. | |
# https://www.insee.fr/fr/statistiques/2540004 | |
A | |
AADEL | |
AADIL | |
AAKASH | |
AALIYA | |
AALIYAH | |
AALYA | |
AALYAH |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Replace 'X' with the domain name of your choice | |
# Back link | |
link:X -site:X | |
# Sub domain | |
site:X -site:www.X | |
# Url | |
inurl:X -site:X |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://www.reddit.com | |
/r/netsec | |
/r/crypto | |
/r/cryptography | |
/r/Malware | |
/r/reverseeningeering | |
/r/csirt_tools/ | |
/r/computerforensics/ | |
/r/antiforensics/ | |
/r/securityctf |
#!/usr/local/bin/python2
from scapy.all import *
os.system("iptables -A OUTPUT -p tcp -o eth0 --sport 1:65535 --tcp-flags RST RST -j DROP")
def packet(pkt):
if pkt[TCP].flags == 2:
print('SYN packet detected port : ' + str(pkt[TCP].sport) + ' from IP Src : ' + pkt[IP].src)
send(IP(dst=pkt[IP].src, src=pkt[IP].dst)/TCP(dport=pkt[TCP].sport, sport=pkt[TCP].dport,ack=pkt[TCP].seq + 1, flags='SA'))