int0x80 / notesLinks
Random notes about the universe and stuff
☆16Updated 5 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Store 802.11 frames in Elasticsearch. Visualize with Kibana☆59Updated last year
- ☆11Updated 7 years ago
- ☆51Updated 2 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆32Updated 7 years ago
- IPMI stuff from DARPA work☆74Updated 3 years ago
- A USB armory based USB sandbox☆22Updated 8 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆27Updated 6 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆37Updated 2 years ago
- Install and configure user mode auditd tools☆34Updated 2 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆49Updated 8 years ago
- Rumble Network Discovery API☆17Updated last year
- DHCP Snooping app - great for finding rogue DHCP servers☆35Updated 8 years ago
- Network visualizer tool built using Processing☆24Updated 4 years ago
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- Dockerfiles for containerized osquery☆14Updated 8 years ago
- VulsRepo is visualized based on the json report output in vuls.☆36Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Hugo repository for main ironpeak.be website.☆12Updated 3 months ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Puppet module for Auditd☆41Updated 5 years ago
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆49Updated 4 years ago
- A library and a tool for converting audit logs to XML and JSON☆46Updated 8 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Updated 2 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Updated 4 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 10 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Updated 11 years ago