eclipsesrcool / poseidonLinks
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict both the type of device and if the device is acting normally or abnormally.
☆47Updated 6 years ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Updated 6 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆45Updated 3 weeks ago
- List of Awesome Offensive Tools written in GO☆203Updated 6 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆126Updated 3 years ago
- Your Social Engineering Sidekick☆182Updated 2 years ago
- internet monitoring osint telegram bot for windows☆154Updated 2 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆124Updated 8 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- ☆41Updated 12 years ago
- Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻☆201Updated 3 years ago
- Live-scraping pastebin to fight boredom.☆113Updated 3 years ago
- A collection of fraud related tools for research.☆151Updated 6 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆89Updated 4 years ago
- A list of private and public (more or less) blackhat boards☆276Updated 6 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script☆281Updated 5 years ago
- Fetch, install and search exploit archives from exploit sites.☆116Updated 2 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- Full malware Kit☆57Updated 4 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆39Updated 6 years ago
- this is the source code of the stuxnet virus only for educational purpose or malware analysic☆72Updated 8 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Various analysis of Android stalkerware☆115Updated 5 years ago
- Distributed P2P Data-driven Workflow Framework☆270Updated last week
- Use Tor for anonymous scanning with nmap☆86Updated 10 years ago
- ☆116Updated 6 months ago
- Various codes related to Ransomware Developement☆123Updated 8 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated this week
- brute force SSH public-key authentication☆77Updated 7 months ago
- archive of code from http://www.unicornscan.org/☆79Updated 13 years ago