ghousali17 / IDS-CView external linksLinks
A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected network interface.
☆10Apr 16, 2018Updated 7 years ago
Alternatives and similar repositories for IDS-C
Users that are interested in IDS-C are comparing it to the libraries listed below
Sorting:
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 7 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆26Sep 23, 2018Updated 7 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Mar 17, 2019Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- ☆16Sep 4, 2024Updated last year
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 2 months ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- st2 salt integration pack☆13Apr 7, 2024Updated last year
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆41Jan 10, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/pentest-bookmarks☆12Aug 1, 2015Updated 10 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- A deployment toolkit built on top of Fabric.☆10Apr 16, 2018Updated 7 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆10Jun 27, 2018Updated 7 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Simple Linux Kernel Module rootkit for 5.x/6.x x86/64 only☆13Apr 21, 2025Updated 9 months ago
- The Scorebot Engine is a platform that allows scoring, host checking and other cool stuff☆10Nov 10, 2024Updated last year
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 2 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- ☆10Jun 22, 2025Updated 7 months ago
- ☆12Jan 12, 2023Updated 3 years ago
- Execute system calls over the network☆11Nov 17, 2014Updated 11 years ago