martinholovsky / Securix-Linux
Securix Main repository including installer and controll scripts
☆14Updated 4 years ago
Alternatives and similar repositories for Securix-Linux:
Users that are interested in Securix-Linux are comparing it to the libraries listed below
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆25Updated 6 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689☆18Updated last year
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- python based backdoor software☆17Updated 13 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- More Obvious Webmalware Repository☆15Updated 8 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 9 months ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- ☆15Updated 8 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Converts the Clamav Virus Database definitions to YARA rules [GOLANG]☆52Updated 4 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Install and configure user mode auditd tools☆34Updated 2 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 11 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 10 years ago
- post-exploitation tools☆15Updated 7 years ago