IliasKar / 5G_security_malicious_traffic_detection
☆21Updated last year
Alternatives and similar repositories for 5G_security_malicious_traffic_detection:
Users that are interested in 5G_security_malicious_traffic_detection are comparing it to the libraries listed below
- ☆18Updated 11 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆15Updated 2 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆20Updated 2 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 7 months ago
- Public Code for ICS Evasion Attack Generation☆42Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆15Updated 4 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆11Updated last year
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated last year
- ☆12Updated 4 years ago
- ☆24Updated 2 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆13Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 3 weeks ago
- SecurityBsides Roma Conference Repo☆10Updated 2 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 3 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆18Updated 5 months ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 9 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Golang Shlyuz Implant Implementation☆12Updated last year
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆28Updated last week
- External telegram feeder for AIL framework☆14Updated last week
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- Presentation Slides and Resources☆15Updated 8 months ago