eshiferax / chaoslemurLinks
Injecting failures into BGP.
☆10Updated 10 years ago
Alternatives and similar repositories for chaoslemur
Users that are interested in chaoslemur are comparing it to the libraries listed below
Sorting:
- ☆48Updated 9 years ago
- Prometheus Firewall Analyzer☆48Updated 10 years ago
- Automatic firewall rule orchestator.☆82Updated 8 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 10 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- BGP Route Leaks Detection☆71Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 3 years ago
- Hardening Tool for *nixes☆50Updated 8 years ago
- A collection of code snippets used in blog posts.☆54Updated 4 months ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆39Updated 10 months ago
- NTP logger/honeypot☆55Updated 11 years ago
- Tool for scanning Cisco router products over SSH☆55Updated 11 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 7 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Honeypot (Dionaea and kippo) setup script☆83Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 10 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Passive DNS V2☆60Updated 11 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Analyse SQL injection attempts in web server logs☆82Updated 9 years ago
- Normalizer for honeypot data.☆46Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Updated 9 years ago