eshiferax / chaoslemurLinks
Injecting failures into BGP.
☆10Updated 9 years ago
Alternatives and similar repositories for chaoslemur
Users that are interested in chaoslemur are comparing it to the libraries listed below
Sorting:
- ☆48Updated 9 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- A collection of code snippets used in blog posts.☆54Updated last month
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Prometheus Firewall Analyzer☆47Updated 10 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Automatic firewall rule orchestator.☆83Updated 8 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- ☆49Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- Masscan integrated with Shodan API☆42Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Tool for scanning Cisco router products over SSH☆56Updated 10 years ago
- CVE-2016-2776☆27Updated 9 years ago
- AutoBrowser Screenshot☆49Updated 9 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- A fully featured malware scanner for Linux desktops and servers.☆69Updated 3 years ago
- Hardening Tool for *nixes☆50Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 9 years ago
- Analyse SQL injection attempts in web server logs☆82Updated 8 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Repo for autosnort scripts.☆157Updated 5 years ago