Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.
☆21May 2, 2016Updated 9 years ago
Alternatives and similar repositories for ns
Users that are interested in ns are comparing it to the libraries listed below
Sorting:
- Snort Rules☆19Mar 9, 2016Updated 9 years ago
- A program that uses xapian to index the flat file databases used by nfdump or flow-tools☆36Mar 26, 2018Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 6 years ago
- Python static blog generator☆42Nov 1, 2016Updated 9 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- Simple host-based permit-by-exception iptables generation script☆16Sep 5, 2020Updated 5 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- ☆10Apr 30, 2024Updated last year
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Deterministic security layer for Openclaw(Clawdbot), Cursor and Claude Code. Write secure code, prevent data exfil, and more☆40Feb 5, 2026Updated 3 weeks ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- A heatmap vizualization of bucketed ranged data over time.☆22Apr 1, 2013Updated 12 years ago
- 123123☆16Dec 31, 2025Updated 2 months ago
- Automatically sync Google Calendar entries as Habitica To Do items.☆10May 31, 2022Updated 3 years ago
- Nmap enumeration and script scan automation script☆38Mar 7, 2023Updated 2 years ago
- DOTS - Directed acyclic graph based Online Trajectory Simplification algorithm☆10Aug 7, 2018Updated 7 years ago
- ☆10Sep 25, 2024Updated last year
- WordPress Optimization Solutions☆10Mar 13, 2019Updated 6 years ago
- The companion code to the paper "Model-based Causal Bayesian Optimization"☆11Nov 16, 2022Updated 3 years ago
- A small command line application that pulls temps of various hardware components using Open Hardware Monitor Lib, outputs info along with…☆12Feb 14, 2018Updated 8 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- A user-friendly tool for creating multi-tenant environments to run experiments in, such as detecting lateral movement attacks.☆11Aug 31, 2021Updated 4 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Dec 11, 2025Updated 2 months ago
- A talk about basic Bluetooth Low Energy concepts followed by code explanations.☆11Jun 24, 2017Updated 8 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago