An Intrusion Detection System written in Python
☆28Oct 28, 2023Updated 2 years ago
Alternatives and similar repositories for Toucan-IDS
Users that are interested in Toucan-IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- 一个简单的php危险函数检测工具☆10Dec 19, 2018Updated 7 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- ✓ Using scapy and nmap tools, find out ip/port, ARP SPOOFING & TCP SESSION HIJACKING ✓ Using snort tool provided Intrusion Detection Syst…☆10Oct 29, 2019Updated 6 years ago
- CVE-2019-0708批量检测☆13Mar 31, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- eBPF C programs injectable in a network card to extract packets' features for detecting different network attacks.☆14May 6, 2022Updated 3 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 8 years ago
- Some python scripts are used to export userdata from huge idb(ida's database),ida 7.0 support only☆21Oct 18, 2018Updated 7 years ago
- ☆21Nov 5, 2011Updated 14 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 7 years ago
- ⚡️ A curated list of awesome things related to Infisical☆23Oct 16, 2023Updated 2 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆16Aug 29, 2018Updated 7 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- GhostSec Scam Detection Tool☆16Feb 11, 2021Updated 5 years ago
- 反弹shell生成器☆17Jul 23, 2018Updated 7 years ago
- A PoC for CVE-2018-7249☆15Apr 29, 2025Updated 10 months ago
- Shadowsocks/ShadowsocksR 账号在线监控☆12Nov 25, 2018Updated 7 years ago
- 灵蛇·代理抓取工具☆16Aug 31, 2021Updated 4 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- CVE-2017-10271 POC☆29Jan 10, 2018Updated 8 years ago
- Some handy script to collect hosts installed redis (using Shodan search engine) and exploit them☆18Aug 20, 2016Updated 9 years ago
- ThinkPHP 3.2.X POC Report By 风起☆12Apr 24, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- Simple IRC Bot for flooding☆11Sep 12, 2011Updated 14 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- 该资源为作者CTF学习Web类型题目解题思路,希望对您有所帮助~☆12Jun 13, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Builds a hosts file and an Unbound config for blocking advertising and malware domains.☆10Jan 3, 2016Updated 10 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- nacos api bypass & jwt bypass & get all configs☆42Aug 9, 2023Updated 2 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- CrabCrypt is a secure file encryption tool with GUI, designed for effortlessly encrypting and decrypting any file. With AES encryption an…☆24Mar 17, 2025Updated last year
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago