eclipsesrcool / poseidonLinks
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict both the type of device and if the device is acting normally or abnormally.
☆47Updated 6 years ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Updated 5 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆124Updated 8 years ago
- Live-scraping pastebin to fight boredom.☆111Updated 3 years ago
- Distributed P2P Data-driven Workflow Framework☆269Updated last week
- ☆32Updated last year
- A collection of fraud related tools for research.☆149Updated 6 years ago
- Full malware Kit☆58Updated 4 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆162Updated last year
- Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻☆200Updated 2 years ago
- Create root and intermediate Certificate Authorities, issue user and server certificates, etc. for testing purposes.☆110Updated 8 months ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- DDS workshops at DEFCON☆80Updated last year
- Your Social Engineering Sidekick☆183Updated 2 years ago
- Various analysis of Android stalkerware☆113Updated 5 years ago
- Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers☆28Updated 8 years ago
- Wi-Fi CTF Generator application for Raspberry Pi hardware☆24Updated 7 years ago
- Carbanak leaked source☆74Updated 7 years ago
- internet monitoring osint telegram bot for windows☆157Updated 2 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆39Updated 5 years ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆227Updated last year
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- An open source RansomWare☆89Updated 5 years ago
- ☆59Updated 8 years ago
- A list of private and public (more or less) blackhat boards☆275Updated 6 years ago
- FUZZBUNCH - NSA security tools☆78Updated 8 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆48Updated 9 years ago
- this is the source code of the stuxnet virus only for educational purpose or malware analysic☆71Updated 8 years ago