aatlasis / Chiron
Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.
☆207Updated 6 years ago
Alternatives and similar repositories for Chiron:
Users that are interested in Chiron are comparing it to the libraries listed below
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆222Updated 5 years ago
- Decept Network Protocol Proxy☆275Updated 2 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- A RADIUS authentication server audit tool☆79Updated 6 years ago
- Smart Install Client Scanner☆61Updated 5 years ago
- ☆169Updated 3 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆105Updated 8 years ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆227Updated 6 years ago
- Next Generation Firewall Audit and Bypass Tool☆263Updated 7 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆208Updated 7 years ago
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆198Updated 3 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Internet data acquisition☆149Updated 4 years ago
- a network packet capture compiler☆197Updated 2 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆112Updated 4 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆224Updated 9 years ago
- Nmap custom probes for better detecting SAP services☆134Updated 11 months ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆208Updated 4 years ago
- First IDE for Nmap Script (NSE) Development.☆356Updated 4 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆142Updated 5 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- ☆79Updated 2 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated last year
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Platform Firmware Auditing Tool☆130Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆158Updated 5 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago