A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybersecurity professionals and enthusiasts.
☆17Oct 20, 2024Updated last year
Alternatives and similar repositories for Scapy-Network-Security-Tools
Users that are interested in Scapy-Network-Security-Tools are comparing it to the libraries listed below
Sorting:
- ☆22Jan 29, 2025Updated last year
- ☆20Feb 3, 2026Updated 3 weeks ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 4 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 4 months ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ☆12Jun 26, 2023Updated 2 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆35Updated this week
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- ☆15Feb 2, 2025Updated last year
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.☆101Oct 12, 2025Updated 4 months ago
- Scans Slack for API tokens, credentials, passwords, and more using YARA rules☆40Feb 26, 2021Updated 5 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- Armbian build tools☆11Apr 6, 2020Updated 5 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 4 months ago
- ☆13Sep 10, 2019Updated 6 years ago
- Where a Linux sys-admin's perinoid scripts are collected.☆10Feb 3, 2016Updated 10 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- ☆12Aug 25, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Collection of misc (mostly JTAG and Serial Wire Debug) adapters.☆13Dec 13, 2017Updated 8 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Username / Password list combo from my honeypot.☆14Apr 13, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- MCP server for using the REMnux malware analysis toolkit via AI assistants☆39Updated this week
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- ☆15Apr 10, 2025Updated 10 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- ☆14Feb 20, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year