cisagov / network-architecture-verification-and-validationView external linksLinks
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆35Jun 5, 2024Updated last year
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
Sorting:
- A tool for detecting sensitive data in code repositories☆17Dec 15, 2025Updated 2 months ago
- Zeek Modbus Extension Scripts - CISA ICSNPP☆20Dec 16, 2025Updated last month
- A packet capture visualizer for industrial control networks.☆55Dec 4, 2023Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Nov 4, 2024Updated last year
- scripts☆10Aug 25, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆82Oct 25, 2017Updated 8 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- DOS Program Development☆12Nov 9, 2022Updated 3 years ago
- Open Virginia GIS is a repository of gis data mapping the Commonwealth of Virginia, its localities, features, demographics, etc. Census d…☆16Jan 28, 2019Updated 7 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆41Oct 18, 2022Updated 3 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆45Jul 19, 2021Updated 4 years ago
- The New Windows Installer for FusionInventory Agent☆11Mar 3, 2022Updated 3 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Dec 4, 2022Updated 3 years ago
- It's yet another static site generator. Have you seen jekyll? hyde? Yup. Like those.☆49Aug 24, 2021Updated 4 years ago
- Repository for the Oulu University Security Engineering course.☆13Sep 12, 2025Updated 5 months ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 2 weeks ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆269Mar 17, 2023Updated 2 years ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- Official OWASP Top 10 Document Repository☆10Jan 9, 2018Updated 8 years ago
- Monthly summary email of Firefly III categories☆16Dec 22, 2023Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Various stuff and tweaks I have around Obsidian☆12Jun 20, 2025Updated 7 months ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Actual real-world ransomware coded in WinAPI C++ with the help of the Cryptography API made to encrypt a whole Windows installation☆10Sep 5, 2023Updated 2 years ago
- Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP☆10Jun 26, 2021Updated 4 years ago