jfsulliv-zz / scapyHuntLinks
Network security exercises in a SDN made from handcrafted packets
☆27Updated 9 years ago
Alternatives and similar repositories for scapyHunt
Users that are interested in scapyHunt are comparing it to the libraries listed below
Sorting:
- An SDN penetration testing toolkit☆117Updated last year
- BGP Route Leaks Detection☆71Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- A workshop on Packet Crafting using Scapy.☆157Updated 5 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 3 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆57Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- A RADIUS authentication server audit tool☆79Updated 7 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- BGP Hijack Detection☆117Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- File transfer via DNS☆76Updated 8 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆57Updated 6 years ago
- first commit☆20Updated 5 months ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Updated 6 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 11 years ago
- Mass static malware analysis tool☆94Updated 4 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆121Updated 6 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- Rogue AP killer☆91Updated 8 years ago
- Scapy Penetration testing scripts☆21Updated 10 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- ☆48Updated 3 years ago
- ☆47Updated 5 years ago