☆22Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for 5G_security_malicious_traffic_detection
Users that are interested in 5G_security_malicious_traffic_detection are comparing it to the libraries listed below
Sorting:
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- ☆10Nov 26, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Real-time detection and defense against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry…☆26Dec 8, 2025Updated 3 months ago
- ☆47Jan 25, 2024Updated 2 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- ☆16Oct 18, 2024Updated last year
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- ☆21Feb 18, 2025Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆60Aug 5, 2019Updated 6 years ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆39Sep 12, 2024Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Jul 12, 2023Updated 2 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Signal Tracking & Detection☆23Feb 14, 2026Updated 3 weeks ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- ☆18Mar 26, 2024Updated last year
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- Force target victim to unsafe network☆31Jun 6, 2025Updated 9 months ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- A tool for modifying and replaying 5G protocol network traffic using attack injection and fuzzing.☆96Nov 20, 2025Updated 3 months ago
- ☆20Sep 24, 2025Updated 5 months ago
- An SDR-based open-source C-V2X traffic generator for stress testing vehicular communication☆30May 10, 2022Updated 3 years ago
- ☆24Feb 14, 2024Updated 2 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆24Sep 22, 2020Updated 5 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Jul 18, 2024Updated last year
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated 2 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year