nzymedefense / nzymeLinks
CLOSE ACCESS DENIAL.
☆1,511Updated this week
Alternatives and similar repositories for nzyme
Users that are interested in nzyme are comparing it to the libraries listed below
Sorting:
- Docker configuration to quickly setup your own Canarytokens.☆635Updated last month
- Advanced Honeypot framework.☆1,268Updated last year
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,025Updated 3 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Updated last year
- Canarytokens helps track activity and actions on your network.☆1,923Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,201Updated this week
- Your Everyday Threat Intelligence☆1,898Updated 2 weeks ago
- Phishing catcher using Certstream☆1,754Updated last year
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,342Updated this week
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,024Updated 5 years ago
- Modular and decentralised honeypot☆2,572Updated 3 months ago
- Modern Honey Network☆2,460Updated 9 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,798Updated last month
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,760Updated 3 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,101Updated 4 years ago
- Loki - Simple IOC and YARA Scanner☆3,631Updated 2 weeks ago
- Home of the dionaea honeypot☆766Updated last year
- DShield Raspberry Pi Sensor☆484Updated 2 weeks ago
- A framework for layer 2 attacks☆793Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,294Updated 7 months ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,624Updated 4 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆722Updated this week
- Digging Deeper....☆3,413Updated this week
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,266Updated last year
- A mostly-serverless distributed hash cracking platform☆813Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,355Updated 11 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,719Updated 9 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆605Updated last year
- Network Security Monitoring on Raspberry Pi type devices☆789Updated 7 years ago
- Simple Bash IOC Scanner☆754Updated 3 years ago