nzymedefense / nzymeLinks
CLOSE ACCESS DENIAL.
☆1,536Updated last week
Alternatives and similar repositories for nzyme
Users that are interested in nzyme are comparing it to the libraries listed below
Sorting:
- Docker configuration to quickly setup your own Canarytokens.☆645Updated last week
- Canarytokens helps track activity and actions on your network.☆2,011Updated last week
- Modular and decentralised honeypot☆2,751Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Updated 3 weeks ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,330Updated this week
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,039Updated 4 years ago
- Advanced Honeypot framework.☆1,301Updated 2 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,033Updated 5 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,649Updated 5 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,455Updated last year
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆619Updated 3 months ago
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,839Updated 3 years ago
- Your Everyday Threat Intelligence☆1,949Updated last week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,614Updated last month
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,312Updated last year
- DShield Raspberry Pi Sensor☆508Updated last week
- A manager for your secrets.☆957Updated last year
- Home of the dionaea honeypot☆787Updated last year
- A framework for layer 2 attacks☆829Updated 2 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆843Updated 5 years ago
- Phishing catcher using Certstream☆1,786Updated last year
- Digging Deeper....☆3,726Updated last week
- JackIt - Exploit Code for Mousejack☆886Updated 5 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,043Updated 3 months ago
- Modern Honey Network☆2,468Updated last year
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Updated 4 years ago
- GoCrack is a management frontend for password cracking tools written in Go☆1,262Updated 2 months ago
- A mostly-serverless distributed hash cracking platform☆823Updated last year
- Loki - Simple IOC and YARA Scanner☆3,712Updated 3 weeks ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆751Updated this week