aatlasis / ChironLinks
Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.
☆209Updated 7 years ago
Alternatives and similar repositories for Chiron
Users that are interested in Chiron are comparing it to the libraries listed below
Sorting:
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆225Updated 10 years ago
- A RADIUS authentication server audit tool☆79Updated 7 years ago
- Smart Install Client Scanner☆61Updated 5 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Updated 8 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Updated 6 years ago
- Vulnerability Data in ES☆143Updated 8 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Updated 6 years ago
- Decept Network Protocol Proxy☆279Updated 2 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Updated 5 years ago
- Nmap custom probes for better detecting SAP services☆142Updated last year
- SpiderLabs shared Nmap Tools☆229Updated 5 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆57Updated 7 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 7 years ago
- Tool for introspection of SSL\TLS sessions☆142Updated 3 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 6 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- ☆90Updated 8 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- Slides from various talks that I've given over the years☆118Updated 2 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Updated 9 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 3 years ago
- BlueKeep scanner supporting NLA☆165Updated 6 years ago
- Automatic firewall rule orchestator.☆82Updated 8 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago