nzymedefense / nzyme
Network Defense System.
☆1,469Updated this week
Alternatives and similar repositories for nzyme:
Users that are interested in nzyme are comparing it to the libraries listed below
- Advanced Honeypot framework.☆1,240Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,427Updated last month
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,014Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,266Updated 5 months ago
- Your Everyday Threat Intelligence☆1,816Updated 2 weeks ago
- Canarytokens helps track activity and actions on your network.☆1,812Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,562Updated this week
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,676Updated last year
- Phishing catcher using Certstream☆1,730Updated 6 months ago
- Digging Deeper....☆3,127Updated this week
- Docker configuration to quickly setup your own Canarytokens.☆613Updated 2 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 7 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,262Updated last month
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,378Updated 4 months ago
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,567Updated 2 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆597Updated 9 months ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,235Updated 7 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,065Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,101Updated last month
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,637Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log