Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
☆28May 13, 2024Updated last year
Alternatives and similar repositories for nefias
Users that are interested in nefias are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆15Apr 17, 2025Updated 11 months ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 10 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- Open source tool for static analysis of malwares.☆29Jul 10, 2020Updated 5 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆40Oct 26, 2020Updated 5 years ago
- A re-useable, stand-alone version of LittleSis network storytelling tool☆12Jan 30, 2016Updated 10 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Jul 30, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This is the official repository for the back end of Mobilinux App.☆21Oct 1, 2023Updated 2 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 7 years ago
- A Python based Web Application security scanner☆25Nov 26, 2020Updated 5 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26May 8, 2020Updated 5 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- Collection of tools to build and run a distributed spamtrap system, consisting of IMAP and SMTP collectors and a backend that extracts at…☆12Oct 23, 2023Updated 2 years ago
- Polynomial arithmetic over GF2☆12Oct 30, 2018Updated 7 years ago
- A dockerized version of the sof-elk project☆13Jul 1, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Verdict-as-a-Service SDKs: Analyze files for malicious content☆38Updated this week
- A tool that automates the process of enumeration☆30Oct 27, 2020Updated 5 years ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆67Nov 22, 2020Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆142Oct 3, 2023Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆168Sep 27, 2022Updated 3 years ago
- PowerShell provider for Dropbox☆13Mar 8, 2018Updated 8 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Post-Quantum Encryption Algorithm☆17Jul 3, 2020Updated 5 years ago
- Auto phishing form-based websites☆10Feb 20, 2020Updated 6 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Nov 20, 2020Updated 5 years ago
- Hacking tools☆148Feb 11, 2025Updated last year
- ☆100Nov 10, 2021Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Typodetect☆75Jun 7, 2021Updated 4 years ago