Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
☆28May 13, 2024Updated last year
Alternatives and similar repositories for nefias
Users that are interested in nefias are comparing it to the libraries listed below
Sorting:
- Collection of my network covert channel tools.☆17Updated this week
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆15Apr 17, 2025Updated 10 months ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- A re-useable, stand-alone version of LittleSis network storytelling tool☆12Jan 30, 2016Updated 10 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆40Oct 26, 2020Updated 5 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Open source tool for static analysis of malwares.☆29Jul 10, 2020Updated 5 years ago
- This is the official repository for the back end of Mobilinux App.☆21Oct 1, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A scrapper to identify whether a person is of interest against key databases.☆21Apr 17, 2019Updated 6 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26May 8, 2020Updated 5 years ago
- A tool for scraping tweet ids from the Twitter website.☆31Feb 23, 2017Updated 9 years ago
- A Python based Web Application security scanner☆25Nov 26, 2020Updated 5 years ago
- A tool that automates the process of enumeration☆30Oct 27, 2020Updated 5 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆68Nov 22, 2020Updated 5 years ago
- Typodetect☆74Jun 7, 2021Updated 4 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- Rank Aggregation Algorithms☆12Jul 22, 2014Updated 11 years ago
- European Parliament website Python scraper☆12Oct 19, 2016Updated 9 years ago
- Verdict-as-a-Service SDKs: Analyze files for malicious content☆38Updated this week
- OSoMe API mashups☆11Jan 29, 2019Updated 7 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- Hacking tools☆148Feb 11, 2025Updated last year
- Re-usable wrapper scripts for text document extractors.☆37Jun 18, 2016Updated 9 years ago
- The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.☆97Apr 22, 2024Updated last year
- This is an unofficial repository, for the official repository visit: https://git.anonymousmessenger.ly/dx/AnonymousMessenger☆82Nov 1, 2023Updated 2 years ago
- This is a tool installer for hackers☆11Aug 7, 2020Updated 5 years ago
- ☆11Aug 4, 2022Updated 3 years ago
- Implementation of data dimensionality reduction algorithms SVD and CUR without using library functions.☆10Jul 24, 2017Updated 8 years ago
- Data notification service: subscribe to keywords and get notified whenever an open data sources mentions that keyword.☆24Aug 25, 2013Updated 12 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Nov 20, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Command-line tool for building Gephi force-directed graph diagrams.☆10Nov 10, 2017Updated 8 years ago