cmu-sei / welledLinks
Wireless Emulation Link Layer Exchange Daemon. These applications are used to extend a mac80211_hwsim simulation across multiple VMs and additional provide NMEA GPS feed simulation.
☆36Updated last year
Alternatives and similar repositories for welled
Users that are interested in welled are comparing it to the libraries listed below
Sorting:
- Scripts to generate an Internet simulation☆35Updated 10 months ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- Oil Pumpjack: open source materials to create your own oil pumpjack managed by an Arduino☆33Updated 6 years ago
- ☆28Updated 5 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Use Markov Chains to obfuscate data as other data☆53Updated 8 years ago
- first commit☆20Updated last year
- Connection Tracker is a passive network connection tracker for profiling, history, auditing and network discovery.☆47Updated 7 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Rekall is an endpoint security solution.☆39Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆86Updated 6 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 11 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- Scoring Engine for CTF competitions☆47Updated 2 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Packet communication investigator☆92Updated 2 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Sample files for Control Things Platform☆40Updated 3 weeks ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆41Updated 4 years ago
- Zeek package to detect Zerologon☆11Updated 3 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 7 years ago