imunes / imunes-security
Examples of security scenarios in IMUNES
☆14Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for imunes-security
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆31Updated last month
- A USB armory based USB sandbox☆20Updated 7 years ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆19Updated 8 months ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- all things awesome security☆12Updated 8 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 11 months ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 6 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆83Updated 5 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 3 weeks ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Plugins and signatures☆14Updated 5 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆17Updated 7 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆14Updated 8 months ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- A framework for parsing binary data.☆16Updated 2 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆25Updated 5 years ago
- Network security exercises in a SDN made from handcrafted packets☆27Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 10 months ago