jfsulliv-zz / scapyHunt
Network security exercises in a SDN made from handcrafted packets
☆27Updated 8 years ago
Alternatives and similar repositories for scapyHunt:
Users that are interested in scapyHunt are comparing it to the libraries listed below
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- HoneySAP: SAP Low-interaction research honeypot☆49Updated last year
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- BGP Route Leaks Detection☆70Updated 6 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 9 years ago
- ☆50Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated last month
- Spam trap management☆23Updated 9 months ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Python bindings for Yeti's API☆18Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 5 months ago
- first commit☆20Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- repo for sharing stuff☆16Updated last year
- ☆21Updated 9 years ago
- BGP Hijack Detection☆111Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- ☆18Updated last year