Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict both the type of device and if the device is acting normally or abnormally.
☆47Mar 25, 2019Updated 7 years ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Bits and pieces that might be useful for training a Watson Conversation service☆12Mar 28, 2017Updated 8 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆13Feb 19, 2022Updated 4 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆31Mar 22, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- Sometimes it can be complicated to read certain sensors to see what is going on. This tutorial makes that simple, with only open-source t…☆11Apr 1, 2021Updated 4 years ago
- [DEPRECATED] utility functions for several generative algorithms.☆10Sep 5, 2016Updated 9 years ago
- Open source HTML5 charts using the canvas tag.☆33Dec 4, 2015Updated 10 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆13Feb 6, 2023Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- gitbook of all pentesting knowledge☆21May 1, 2023Updated 2 years ago
- A fully-functional Social media site named socio made using django framework with its inbuilt mysql database.☆16Mar 14, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Example code for controlling GPIO features of a Raspberry Pi.☆14Dec 21, 2016Updated 9 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Learn to build technical communities on your campus,☆12Aug 4, 2022Updated 3 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- ☆12Jul 30, 2025Updated 7 months ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago
- SQL SERVER Exploitation.☆27Mar 18, 2017Updated 9 years ago
- ☆13Feb 16, 2016Updated 10 years ago
- PyTorch implementation of binary neural networks☆45Mar 20, 2019Updated 7 years ago
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 8 months ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- Files that dictate the tauOS OSTree☆11Jun 28, 2023Updated 2 years ago
- finite statemachine editor for vvvv☆22Dec 8, 2022Updated 3 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆10Jan 13, 2023Updated 3 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- My CTF writeups☆13Oct 1, 2020Updated 5 years ago
- Amazon Echo skill to trigger the native Apple Find My iPhone "play sound" feature. Written in Python 3.6 and deploys easily on AWS Lambda…☆13Aug 3, 2021Updated 4 years ago
- Simple Mermaid diagrams for Laravel applications using the Mermaid.js library.☆26Mar 14, 2025Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 7 months ago