cys3c / Toucan-IDSLinks
An Intrusion Detection System written in Python
☆27Updated 2 years ago
Alternatives and similar repositories for Toucan-IDS
Users that are interested in Toucan-IDS are comparing it to the libraries listed below
Sorting:
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 4 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- Python 3 script for interacting with Shodan API☆20Updated last year
- List of default passwords for Industrial Control Systems☆77Updated 8 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆59Updated 2 weeks ago
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆75Updated 2 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 7 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- bap - http Basic Authentication honeyPot☆51Updated 10 years ago
- ☆46Updated 8 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Perform CVE lookup on cvedetails.com☆27Updated last year
- python wrapper to use tshark for file extraction from the command line.☆26Updated 6 years ago
- Rest API Client to automate Nessus Scanning☆25Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
- A Darktrace CLI written in Python☆16Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆67Updated 3 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆85Updated 5 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago