rambasnet / NetworkSecurity
Jupyter Notebooks for learning network-based buffer overflows, network utilities, and scapy library
☆22Updated 4 months ago
Alternatives and similar repositories for NetworkSecurity:
Users that are interested in NetworkSecurity are comparing it to the libraries listed below
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Python bindings for Yeti's API☆18Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Python module to use the MISP Taxonomies☆29Updated last month
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- A Python based Intrusion Detection and Prevention System. Uses Scapy to sniff packets at a specific interface, extract the remote IPs, sc…☆9Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 2 weeks ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆36Updated 6 years ago
- Some YARA rules i will add from time to time☆12Updated 5 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 2 months ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- pcapdj - dispatch pcap files☆47Updated 4 years ago
- Network Tools☆32Updated last year
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Digital Forensics date and time☆23Updated last month
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- My preparation notes for CompTIA PenTest+ Certification Exam Objectives, exam number PT0-001☆20Updated 6 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- ☆11Updated 4 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 4 years ago
- Python wrapper for the Mitre ATT&CK framework API☆27Updated 6 years ago