f-secure-foundry / ftesterLinks
FTester - firewall and IDS testing tool [historical]
☆24Updated 7 years ago
Alternatives and similar repositories for ftester
Users that are interested in ftester are comparing it to the libraries listed below
Sorting:
- ☆36Updated 4 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- External plugins for examples, experimental, and some legacy code.☆40Updated 2 weeks ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆31Updated 10 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- The ModSecurity Pcap Connector☆27Updated 9 years ago
- Parse nmap scan data with Perl (official repo)☆36Updated 6 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- Tips to protect your personal and company data☆28Updated 5 years ago
- Open Standard Vulnerability & Compliance Scanner☆44Updated 9 years ago
- Dragon Sandbox☆78Updated 12 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- BugOutBag☆65Updated 3 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆17Updated 5 years ago
- ☆24Updated 5 years ago
- Checklists☆17Updated 8 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Build tools to generate vagrant images used by metasploit-framework CI☆13Updated 5 months ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago