eclipsesrcool / poseidon
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict both the type of device and if the device is acting normally or abnormally.
☆47Updated 6 years ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Updated 5 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆43Updated 3 years ago
- Fetch, install and search exploit archives from exploit sites.☆114Updated last year
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- ☆94Updated 5 months ago
- ☆32Updated last year
- bettercap official documentation and website contents☆36Updated 8 months ago
- Use Tor for anonymous scanning with nmap☆84Updated 9 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆41Updated 8 months ago
- random tools to be used for NETSEC☆25Updated 3 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆37Updated 5 years ago
- Carbanak leaked source☆72Updated 6 years ago
- Distributed Honeypot☆62Updated 7 years ago
- Site for NSA's Open Source project listing☆287Updated 5 months ago
- Hive solves a critical problem for the malware operators at the CIA.☆67Updated 7 years ago
- Network based protocol fuzzer☆71Updated 3 years ago
- 😈 The Demon App Store☆29Updated 3 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 3 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆41Updated last year
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆26Updated 6 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Created to simplify interactions with virtual machines☆80Updated 2 months ago
- Metakitty, The Metasploit Resource Portal☆17Updated 3 months ago
- ransomware, made for a demo on ransomware awareness and how easy it is to do☆14Updated 3 years ago
- Airodump-ng WiFi Scan Visualizer☆59Updated 7 years ago
- Proactively-secure Accumulo with Cryptographic Enforcement (PACE) adds client-side encryption and signatures to Accumulo.☆14Updated last year