jzadeh / chiron-elkView external linksLinks
☆138Mar 20, 2019Updated 6 years ago
Alternatives and similar repositories for chiron-elk
Users that are interested in chiron-elk are comparing it to the libraries listed below
Sorting:
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- DejaVU - Open Source Deception Framework☆426Aug 2, 2025Updated 6 months ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 2 months ago
- Tool for introspection of SSL\TLS sessions☆142Jan 26, 2026Updated 3 weeks ago
- ☆79Aug 4, 2022Updated 3 years ago
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 7 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆209Nov 16, 2018Updated 7 years ago
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Jan 16, 2026Updated last month
- Open Source Threat Intelligence Chat Bot☆322Mar 30, 2020Updated 5 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆289Apr 14, 2025Updated 10 months ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Aug 1, 2021Updated 4 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Jun 23, 2020Updated 5 years ago
- Puma Scan is a software security Visual Studio extension that provides real time, continuous source code analysis as development teams wr…☆448Oct 28, 2022Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and fir…☆40Dec 5, 2017Updated 8 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Dec 20, 2019Updated 6 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Jun 7, 2017Updated 8 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 4 years ago
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,165Dec 8, 2022Updated 3 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,854Apr 3, 2023Updated 2 years ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,435Jun 11, 2025Updated 8 months ago