arverma / Data_Diode
A unidirectional network (also referred to as a unidirectional security gateway or data diode ) is a network appliance or device allowing data to travel only in one direction. It is used in guaranteeing information security. They are most commonly found in high security environments such as defense, where they serve as connectio…
☆8Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Data_Diode
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆19Updated 7 months ago
- Multi Cloud Antivirus Scanning API using YARA and CLAMAV for AWS S3, Azure Blob Storage and GCP Cloud Storage☆21Updated 2 months ago
- Network Forensic Extendable Analysis Tool☆38Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago
- A DIY data diode with 2 Raspberry Pis and one Arduino Nano☆28Updated 5 months ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated 11 months ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Updated 5 years ago
- A set of tools to transfer data over a unidirectional network link (typically a network diode).☆53Updated 7 years ago
- Mirror network traffic from one interface to another on Windows☆25Updated 4 years ago
- ☆23Updated this week
- Transfer data from a secure network to an untrusted network using Raspberry Pis (unidirectional network). Disclaimer: Not a true data dio…☆37Updated 7 years ago
- collect logs and alerts from 27 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆16Updated last year
- The Multiplatform Linux Sandbox☆15Updated 10 months ago
- ☆15Updated 6 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆25Updated 8 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- the IoT and OT (Operational Technology) Honeypot☆18Updated 7 months ago
- Malice VirusTotal Plugin☆12Updated 5 years ago
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- Carve files for MFT entries (eg. blkls output or memory dumps). Recovers filenames (long & short), timestamps ($STD & $FN) and data if re…☆21Updated 5 years ago
- ☆13Updated 5 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 6 years ago
- ☆16Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 2 weeks ago
- pure Python binary analysis framework☆22Updated 6 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆21Updated last year