gitkeniwo / gps-spoofing-detectionLinks
☆10Updated 11 months ago
Alternatives and similar repositories for gps-spoofing-detection
Users that are interested in gps-spoofing-detection are comparing it to the libraries listed below
Sorting:
- ☆21Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Updated last year
- Docker Implementation for srsRANProject☆41Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Updated 7 years ago
- Run HTTP and HTTPS traceroutes to detect the network location of censoring middleboxes☆17Updated 2 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Updated 3 years ago
- Script to chain search parameters for MalwareBazaar☆12Updated 9 months ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Updated last year
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆65Updated last year
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆74Updated 2 years ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆19Updated 6 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated last month
- Discover Non-Discoverable Bluetooth Classic devices☆13Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- ☆15Updated last year
- ☆79Updated 7 months ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Updated 3 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Updated 8 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago
- ☆10Updated 2 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆29Updated 3 years ago
- A CLI tool for creating network covert channels within .pcap files.☆13Updated last year
- Public Code for ICS Evasion Attack Generation☆43Updated 4 years ago
- SS7 Attack Simulator based on RestComm's jss7☆100Updated 2 years ago
- NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.☆25Updated 2 years ago