traceroute-circl is an extended traceroute tool designed to support CSIRT operators by displaying abuse and contact information for each hop, CIRCL BGP Ranking services, highlighting specific countries, outputting RBL entries, showing Google Maps traceroute, and providing ASN origin information from RIPE RIS and origin.asn.cymru.com sources.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.
A website scanner that provides a sandbox for the web, allowing users to scan URLs and websites for potential threats and vulnerabilities.
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
A free DNS recursive service that blocks malicious host names and protects user privacy.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.