eclipsesrcool / poseidon
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict both the type of device and if the device is acting normally or abnormally.
☆47Updated 5 years ago
Alternatives and similar repositories for poseidon:
Users that are interested in poseidon are comparing it to the libraries listed below
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Updated 5 years ago
- Fetch, install and search exploit archives from exploit sites.☆111Updated last year
- Supporting files for cyber challenge exercises. #nsacyber☆44Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- this is the source code of the stuxnet virus only for educational purpose or malware analysic☆71Updated 8 years ago
- ☆26Updated 4 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆41Updated 5 months ago
- ☆78Updated last month
- Metakitty, The Metasploit Resource Portal☆17Updated 3 months ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆31Updated 5 years ago
- flood area with fake essids☆20Updated 7 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆76Updated 5 years ago
- ☆32Updated 8 months ago
- An official book about Rizin☆71Updated this week
- ☆49Updated 5 years ago
- My public exploit collection.☆32Updated 6 years ago
- ☆46Updated 7 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆120Updated 7 years ago
- Supporting Data Archives for Ghidra☆175Updated this week
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 11 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻☆190Updated 2 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆123Updated 2 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆66Updated 5 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 3 years ago
- Images and scripts for virtualization☆39Updated 3 years ago
- Mass Windows credential stealer payload for the BashBunny☆14Updated 7 years ago
- brute force SSH public-key authentication☆74Updated 10 months ago