IngegnerLightyear / Alpha-MON
⍺-MON anonymizes network traffic in real time. This software process network traffic on input interfaces to remove privacy sensitive information transmitted in clear by protocols. Then, it transmits anonymized traffic on the output interfaces.
☆13Updated 3 years ago
Alternatives and similar repositories for Alpha-MON:
Users that are interested in Alpha-MON are comparing it to the libraries listed below
- Fetches one or more DNS zones via AXFR and dumps in Unix hosts format for local use☆13Updated last month
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated last year
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Updated 2 months ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆20Updated last week
- Network Entity Reputation Database☆34Updated 2 months ago
- Kiddy - (linux) kernel identity spoofer☆13Updated last year
- Some stuff about telecom security☆14Updated 9 years ago
- Linux Security Auditing Tool☆10Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 4 years ago
- Java network leaks detection utility with easy configurable algorithms☆22Updated 8 years ago
- Build and Interact with a Set of Virtual Machines☆15Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Web interface to mailing list archives☆13Updated 9 months ago
- Emerald Onion's Encrypted DNS Resolver☆28Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- DHCP fingerprints database and related tools☆17Updated 10 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- An I2P based OS made for security☆11Updated 2 months ago
- Fast scanner for exposed env files☆11Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- Capturing audio (.wav) from target using a link☆13Updated 5 years ago
- Docker environment for hackers☆15Updated 4 years ago
- Rayvyn - CVE Monitoring Tool☆10Updated 4 years ago