eshiferax / chaoslemurLinks
Injecting failures into BGP.
☆10Updated 10 years ago
Alternatives and similar repositories for chaoslemur
Users that are interested in chaoslemur are comparing it to the libraries listed below
Sorting:
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- Some scripts for attacks on Tacacs+ protocol☆65Updated 6 years ago
- ☆48Updated 9 years ago
- Automatic firewall rule orchestator.☆82Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- Prometheus Firewall Analyzer☆48Updated 10 years ago
- Tool for scanning Cisco router products over SSH☆55Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- A collection of code snippets used in blog posts.☆54Updated 3 months ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- ☆58Updated 11 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆39Updated 9 months ago
- ☆49Updated 10 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Faraday Continuous Scanning☆34Updated 9 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Analyse SQL injection attempts in web server logs☆82Updated 8 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 9 years ago
- Repo for autosnort scripts.☆157Updated 5 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- ☆54Updated 9 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆67Updated 10 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago