imunes / imunes-security
Examples of security scenarios in IMUNES
☆14Updated 6 years ago
Alternatives and similar repositories for imunes-security:
Users that are interested in imunes-security are comparing it to the libraries listed below
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated last year
- BGP Route Leaks Detection☆70Updated 6 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Network visualizer tool built using Processing☆24Updated 3 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Network security exercises in a SDN made from handcrafted packets☆27Updated 8 years ago
- An open source real-time network topology and protocols analyzer☆29Updated 8 years ago
- Ipsumdump and other programs for command-line network trace manipulation.☆37Updated last year
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Updated 7 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- High performance time ordered PCAP merging utility☆22Updated 2 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Tiny Honeypot☆19Updated 11 years ago
- Wireless Emulation Link Layer Exchange Daemon. These applications are used to extend a mac80211_hwsim simulation across multiple VMs and …☆35Updated 10 months ago
- Yet Another Network Simulator☆25Updated 8 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 7 years ago
- The Official Github Repository of Daemonlogger☆21Updated 3 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Updated 7 years ago
- A Python library for parsing, manipulating, and generating MAEC content.☆41Updated 4 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆22Updated 3 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago