aatlasis / ChironLinks
Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.
☆209Updated 7 years ago
Alternatives and similar repositories for Chiron
Users that are interested in Chiron are comparing it to the libraries listed below
Sorting:
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆225Updated 9 years ago
- A RADIUS authentication server audit tool☆79Updated 7 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Updated 6 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- Next Generation Firewall Audit and Bypass Tool☆267Updated 8 years ago
- Smart Install Client Scanner☆62Updated 5 years ago
- Some scripts for attacks on Tacacs+ protocol☆65Updated 6 years ago
- Decept Network Protocol Proxy☆281Updated 2 years ago
- SpiderLabs shared Nmap Tools☆229Updated 5 years ago
- Nmap custom probes for better detecting SAP services☆142Updated last year
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Updated 5 years ago
- An SDN penetration testing toolkit☆117Updated last year
- Small CTF challenges running on Docker☆158Updated 7 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆55Updated 7 years ago
- Vulnerability Data in ES☆143Updated 8 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 6 years ago
- First IDE for Nmap Script (NSE) Development.☆359Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆238Updated 3 years ago
- A network packet forensics tool for SSH☆253Updated 4 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 7 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆113Updated 5 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆172Updated 10 months ago
- ☆90Updated 8 years ago
- BlueKeep scanner supporting NLA☆165Updated 6 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆209Updated 8 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago