eclipsesrcool / poseidon
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict both the type of device and if the device is acting normally or abnormally.
☆46Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for poseidon
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆36Updated 5 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆40Updated 3 months ago
- Airodump-ng WiFi Scan Visualizer☆56Updated 6 years ago
- My solutions to the 2020 NSA Codebreaker Challenge☆75Updated 3 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆161Updated 2 years ago
- ransomware, made for a demo on ransomware awareness and how easy it is to do☆14Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 3 years ago
- Full malware Kit☆57Updated 3 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- ☆49Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆197Updated 5 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- Your Social Engineering Sidekick☆177Updated last year
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 5 years ago
- A collection of malware that we use for testing and training☆12Updated 4 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- ☆51Updated 3 years ago
- cicada-2014☆48Updated 2 years ago
- archive of code from http://www.unicornscan.org/☆70Updated 12 years ago
- Operational Security utility and automator.☆131Updated 4 years ago
- A basic script that unzips a password protected .zip by performing a brute-force attack using either a word list, password list or a dict…☆21Updated 4 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆141Updated last year
- Simple Karma Attack☆66Updated 4 years ago
- ☆83Updated 7 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- A Python program that scans RAM.☆37Updated 9 years ago