jivoi / ids_and_siemLinks
intrusion detection
☆24Updated 8 years ago
Alternatives and similar repositories for ids_and_siem
Users that are interested in ids_and_siem are comparing it to the libraries listed below
Sorting:
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- only for 31337☆23Updated 8 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- home! sweet home☆24Updated 6 years ago
- openvpn server configs☆14Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- devops scripts☆33Updated 8 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- Pentest ToolKit☆28Updated 5 years ago
- scripts for pentesting☆89Updated 7 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆22Updated 7 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- buffer overflow examples☆22Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆30Updated 9 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Wireless Forensics Framework In Python☆20Updated 8 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- DPE - Default Password Enumeration☆35Updated 12 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆36Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- ☆22Updated 9 years ago