cdpxe / nefiasLinks
Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
☆27Updated last year
Alternatives and similar repositories for nefias
Users that are interested in nefias are comparing it to the libraries listed below
Sorting:
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- Custom security distro for remote penetration testing☆53Updated 4 years ago
- ☆33Updated 5 months ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 4 years ago
- URL fingerprinting made easy☆87Updated last year
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆71Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- ☆21Updated 2 years ago
- Windows Security Logging☆43Updated 2 years ago