eclipsesrcool / poseidonLinks
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict both the type of device and if the device is acting normally or abnormally.
☆47Updated 6 years ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Updated 6 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆125Updated 8 years ago
- Your Social Engineering Sidekick☆183Updated 3 years ago
- A tool for processing a lot of pcaps using tshark☆155Updated 2 years ago
- ☆34Updated last year
- ☆134Updated 6 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆46Updated last week
- brute force SSH public-key authentication☆77Updated 7 months ago
- Full malware Kit☆57Updated 4 years ago
- internet monitoring osint telegram bot for windows☆154Updated 2 years ago
- A collection of fraud related tools for research.☆151Updated 6 years ago
- Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻☆202Updated 3 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- Fetch, install and search exploit archives from exploit sites.☆117Updated 2 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆90Updated 10 years ago
- The User Interface for GoCrack☆88Updated 2 months ago
- Hacker OPSEC☆100Updated 7 years ago
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆163Updated last year
- A memorial site for Hackers and Infosec people who have passed☆137Updated last month
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆219Updated 4 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- Live-scraping pastebin to fight boredom.☆113Updated 3 years ago
- List of Awesome Offensive Tools written in GO☆203Updated 6 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- ☆28Updated 5 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆127Updated 3 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆39Updated 6 years ago