eclipsesrcool / poseidonLinks
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict both the type of device and if the device is acting normally or abnormally.
☆47Updated 6 years ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆126Updated 8 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- internet monitoring osint telegram bot for windows☆155Updated 2 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Updated 5 years ago
- A collection of fraud related tools for research.☆149Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- ☆129Updated 6 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- A list of private and public (more or less) blackhat boards☆273Updated 6 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆39Updated 5 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- Various analysis of Android stalkerware☆112Updated 5 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆153Updated 7 years ago
- Your Social Engineering Sidekick☆183Updated 2 years ago
- A collection of tools created for computer security research purposes.☆126Updated 5 years ago
- Distributed Honeypot☆62Updated 7 years ago
- ☆27Updated 4 years ago
- Live-scraping pastebin to fight boredom.☆112Updated 3 years ago
- ☆59Updated 8 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆126Updated 2 years ago
- A collection of awesome resources related to 802.11 security, tools and other things☆166Updated 6 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- The User Interface for GoCrack☆88Updated this week
- A malware analysis and classification tool.☆190Updated 3 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆42Updated 2 months ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆150Updated 3 years ago