cys3c / Toucan-IDSLinks
An Intrusion Detection System written in Python
☆26Updated last year
Alternatives and similar repositories for Toucan-IDS
Users that are interested in Toucan-IDS are comparing it to the libraries listed below
Sorting:
- Botnet Simulation Framework☆77Updated 4 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- Python 3 script for interacting with Shodan API☆20Updated 8 months ago
- ☆45Updated 8 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit …☆66Updated 6 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆59Updated 2 weeks ago
- Evading Snort Intrusion Detection System.☆78Updated 3 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆75Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- This project is designed to create deceptive webpages to deceive and redirect attackers away from real websites.☆65Updated 7 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Updated 4 years ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- List of default passwords for Industrial Control Systems☆75Updated 8 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆47Updated 5 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆14Updated 8 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago