nzymedefense / nzymeLinks
CLOSE ACCESS DENIAL.
☆1,499Updated this week
Alternatives and similar repositories for nzyme
Users that are interested in nzyme are comparing it to the libraries listed below
Sorting:
- Docker configuration to quickly setup your own Canarytokens.☆631Updated this week
- Advanced Honeypot framework.☆1,265Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Updated last year
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,022Updated 3 years ago
- Canarytokens helps track activity and actions on your network.☆1,867Updated this week
- Modular and decentralised honeypot☆2,529Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,150Updated 3 weeks ago
- Your Everyday Threat Intelligence☆1,881Updated last week
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,742Updated 3 years ago
- Tracking history of USB events on GNU/Linux☆1,168Updated 2 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,021Updated 5 years ago
- A framework for layer 2 attacks☆783Updated last year
- DShield Raspberry Pi Sensor☆480Updated this week
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,091Updated 4 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,334Updated last week
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆603Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,496Updated 3 weeks ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,611Updated 4 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆720Updated this week
- Phishing catcher using Certstream☆1,757Updated 11 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,327Updated 9 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,676Updated 7 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,291Updated 5 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,044Updated 3 years ago
- A manager for your secrets.☆950Updated last year
- Loki - Simple IOC and YARA Scanner☆3,585Updated 7 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,760Updated this week
- Build interactive map of cameras from Shodan☆1,262Updated 5 years ago
- A mostly-serverless distributed hash cracking platform☆811Updated last year
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,686Updated 2 years ago