imunes / imunes-security
Examples of security scenarios in IMUNES
☆14Updated 6 years ago
Alternatives and similar repositories for imunes-security:
Users that are interested in imunes-security are comparing it to the libraries listed below
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 4 months ago
- Network security exercises in a SDN made from handcrafted packets☆27Updated 8 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆84Updated 5 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- ☆18Updated last year
- Wireless Emulation Link Layer Exchange Daemon. These applications are used to extend a mac80211_hwsim simulation across multiple VMs and …☆35Updated 8 months ago
- ☆11Updated 4 years ago
- first commit☆20Updated last year
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆19Updated 11 months ago
- Yet Another Network Simulator☆25Updated 8 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated 10 months ago
- Notebook collection☆10Updated 5 years ago
- BGP Hijack Detection☆111Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated last week
- BGP Route Leaks Detection☆70Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- ☆24Updated 5 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- Ipsumdump and other programs for command-line network trace manipulation.☆37Updated last year
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- ☆15Updated 6 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Updated 7 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago