eclipsesrcool / poseidonLinks
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict both the type of device and if the device is acting normally or abnormally.
☆47Updated 6 years ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Updated 6 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Fetch, install and search exploit archives from exploit sites.☆116Updated 2 years ago
- ☆28Updated 4 years ago
- ☆131Updated 6 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- dsniff is a collection of tools for network auditing and penetration testing.☆215Updated 15 years ago
- Your Social Engineering Sidekick☆183Updated 2 years ago
- ☆41Updated 12 years ago
- Man-in-the-middle against Tor bridges☆28Updated 5 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆43Updated 4 months ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆124Updated 8 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- A tool for processing a lot of pcaps using tshark☆153Updated 2 years ago
- Live-scraping pastebin to fight boredom.☆113Updated 3 years ago
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆210Updated 4 years ago
- A memorial site for Hackers and Infosec people who have passed☆136Updated 2 months ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- archive of code from http://www.unicornscan.org/☆79Updated 13 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script☆276Updated 5 years ago
- Unpacked tools of CQAcademy☆110Updated 6 years ago
- List of Awesome Offensive Tools written in GO☆201Updated 6 years ago
- A collection of tools created for computer security research purposes.☆131Updated 5 years ago
- ☆108Updated 3 years ago
- A curated list of awesome Internet port and host scanners, plus related components and much more, with a focus on free and open source pr…☆234Updated 3 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- The User Interface for GoCrack☆88Updated last month
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- A collection of Hack The Planet's zines.☆72Updated 9 years ago