OpenNetworkingFoundation / DELTA
PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK
☆222Updated 6 years ago
Alternatives and similar repositories for DELTA
Users that are interested in DELTA are comparing it to the libraries listed below
Sorting:
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆207Updated 6 years ago
- An SDN penetration testing toolkit☆117Updated 7 months ago
- OpenVAS connector for versions 6, 7, 8 and 9☆80Updated 2 years ago
- Honeypot deployment made easy☆235Updated 6 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- ☆307Updated 7 years ago
- A Distributed, Search-Optimized Full Packet Capture System☆242Updated 2 years ago
- Next Generation Firewall Audit and Bypass Tool☆264Updated 8 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- The Seeker of IOC☆129Updated 4 years ago
- ☆168Updated 3 years ago
- Public repository for improvements to the EXTRABACON exploit☆160Updated 8 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆113Updated 4 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆208Updated 8 years ago
- a network packet capture compiler☆199Updated 3 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆105Updated 8 years ago
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆201Updated 3 years ago
- MozDef: The Mozilla Defense Platform☆67Updated 5 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆86Updated 2 years ago
- defplorex for BlackHat Arsenal☆116Updated 7 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- Capturing, analysing and responding to cyber attacks☆170Updated 7 months ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆143Updated 3 weeks ago