aau-network-security / haaukins
A Highly Accessible and Automated Virtualization Platform for Security Education
☆191Updated last month
Alternatives and similar repositories for haaukins:
Users that are interested in haaukins are comparing it to the libraries listed below
- A modular OSINT honeypot for blue teamers☆333Updated last year
- nray distributed port scanner☆154Updated 2 years ago
- ☆50Updated 5 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆114Updated 5 years ago
- Network Pivoting Toolkit☆442Updated last year
- GreyNoise Query Language☆82Updated 5 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 2 months ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆249Updated last month
- Moki Distribution - ICS/SCADA Tools☆108Updated 7 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆244Updated 3 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆255Updated 2 years ago
- Endpoint detection & Malware analysis software☆230Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆118Updated 10 months ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆272Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 10 months ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆132Updated 6 years ago
- Graphical Realism Framework for Industrial Control Simulations☆220Updated 10 months ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- This scoreboard allows you to host your own cybersecurity capture-the-flag (jeopardy-style or attack/defend) competition. Also includes t…☆56Updated last week
- ☆334Updated 2 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆181Updated 5 years ago
- SNIcat☆126Updated 3 years ago
- Respounder detects presence of responder in the network.☆316Updated 5 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- A simple Modbus/TCP client write in pure Perl.☆123Updated last year
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated 3 weeks ago
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago