cys3c / Toucan-IDSLinks
An Intrusion Detection System written in Python
☆28Updated 2 years ago
Alternatives and similar repositories for Toucan-IDS
Users that are interested in Toucan-IDS are comparing it to the libraries listed below
Sorting:
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- Python 3 script for interacting with Shodan API☆20Updated last year
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆76Updated 3 years ago
- Scapy Penetration testing scripts☆21Updated 10 years ago
- ☆46Updated 8 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Updated 6 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 5 years ago
- An anomaly-based intrusion detection system.☆85Updated 3 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆105Updated 3 weeks ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- NmapPy - Python implementation of Nmap☆35Updated 7 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Tool to brute website sub-domains and dirs.☆49Updated 5 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆68Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- python wrapper to use tshark for file extraction from the command line.☆26Updated 7 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆32Updated 4 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆60Updated this week
- Simple High Interaction Honeypot Solution for SMB protocol☆50Updated 4 years ago
- Perform CVE lookup on cvedetails.com☆27Updated 2 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Updated 7 years ago
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆25Updated 7 years ago
- List of default passwords for Industrial Control Systems☆78Updated 8 years ago