eshiferax / chaoslemurLinks
Injecting failures into BGP.
☆10Updated 10 years ago
Alternatives and similar repositories for chaoslemur
Users that are interested in chaoslemur are comparing it to the libraries listed below
Sorting:
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- Automatic firewall rule orchestator.☆82Updated 8 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 10 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Prometheus Firewall Analyzer☆48Updated 10 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 9 years ago
- NTP logger/honeypot☆55Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆67Updated 10 years ago
- AutoBrowser Screenshot☆49Updated 9 years ago
- Tool for scanning Cisco router products over SSH☆55Updated 11 years ago
- ☆49Updated 10 years ago
- ☆58Updated 11 years ago
- Analyse SQL injection attempts in web server logs☆82Updated 8 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 7 years ago
- ☆48Updated 9 years ago
- Repo for autosnort scripts.☆157Updated 5 years ago
- A fully featured malware scanner for Linux desktops and servers.☆69Updated 3 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Passive DNS V2☆60Updated 11 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago