smicallef / spiderfoot

SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
http://www.spiderfoot.net
MIT License
12.93k stars 2.25k forks source link

Updated types #1161

Closed key2peace closed 3 years ago

key2peace commented 3 years ago

https://github.com/smicallef/spiderfoot/blob/742354b5558cd1ae797710d579e9e0f0aabaae73/modules/sfp_dronebl.py#L68-L81

sorry, forking is little overkill for just a simple change, so here we go:

        "dnsbl.dronebl.org": {
            "127.0.0.3": "dronebl.org - IRC Drone",
            "127.0.0.5": "dronebl.org - Bottler",
            "127.0.0.6": "dronebl.org - Unknown spambot or drone",
            "127.0.0.7": "dronebl.org - DDOS Drone",
            "127.0.0.8": "dronebl.org - SOCKS Proxy",
            "127.0.0.9": "dronebl.org - HTTP Proxy",
            "127.0.0.10": "dronebl.org - ProxyChain",
            "127.0.0.11": "dronebl.org - Web Page Proxy",
            "127.0.0.12": "dronebl.org - Open DNS Resolver",
            "127.0.0.13": "dronebl.org - Brute force attackers",
            "127.0.0.14": "dronebl.org - Open Wingate Proxy",
            "127.0.0.15": "dronebl.org - Compromised router / gateway",
            "127.0.0.16": "dronebl.org - Autorooting worms",
            "127.0.0.17": "dronebl.org - Automatically determined botnet IPs (experimental)",
            "127.0.0.18": "dronebl.org - Possibly compromised DNS/MX",
            "127.0.0.19": "dronebl.org - Abused VPN Service",
            "127.0.0.255": "dronebl.org - Unknown"
        }
bcoles commented 3 years ago

You can edit a file from within the GitHub web interface. It will automatically take care of forking for you.