Jupyter Notebooks for learning network-based buffer overflows, network utilities, and scapy library
☆24Oct 15, 2025Updated 5 months ago
Alternatives and similar repositories for NetworkSecurity
Users that are interested in NetworkSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Jan 8, 2020Updated 6 years ago
- Generate complex modifcations for the Karabiner-Elements app on macOS☆18Mar 15, 2022Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago
- GitHub action to move Glo Boards cards to a column☆14Jun 12, 2023Updated 2 years ago
- p0f git repo - unofficial clone☆15Nov 1, 2012Updated 13 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- ☆10Jan 21, 2016Updated 10 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- ☆11Sep 26, 2019Updated 6 years ago
- Track public endpoints and connections across AWS accounts using VPC Flow Logs☆12Jun 14, 2016Updated 9 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Sep 28, 2016Updated 9 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- RACF Database Parser☆12Apr 4, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A packet capture visualizer for industrial control networks.☆56Dec 4, 2023Updated 2 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆15Aug 2, 2017Updated 8 years ago
- Easily create a swapfile on Ubuntu 16 and CentOS 7 hosts.☆16Dec 30, 2016Updated 9 years ago
- Local osx dialog box phishing using osascript. Easier than keylogging on osx. Simply ask for the passwords you want.☆56Nov 1, 2018Updated 7 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 11 months ago
- Logentries Community Packs☆17Jul 7, 2022Updated 3 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- WIP: A set of policies based on Catalyze.io's open sourced and vetted policies for HIPPA compliance.☆13Dec 26, 2014Updated 11 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- ☆15Mar 19, 2019Updated 7 years ago
- ☆16Mar 10, 2023Updated 3 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago