rambasnet / NetworkSecurity
Jupyter Notebooks for learning network-based buffer overflows, network utilities, and scapy library
☆22Updated 3 months ago
Alternatives and similar repositories for NetworkSecurity:
Users that are interested in NetworkSecurity are comparing it to the libraries listed below
- A few quick recipes for those that do not have much time during the day☆22Updated 2 months ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated 3 weeks ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated last month
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 4 months ago
- A tool for detecting sensitive data in code repositories☆14Updated last month
- Detect leaks in security event logs.☆20Updated 5 years ago
- Setting up a training environment for MISP☆11Updated 2 years ago
- Useful commands for infosec☆29Updated last year
- Open YARA scan- and search engine☆20Updated 3 weeks ago
- Python bindings for Yeti's API☆18Updated last year
- Python client for the Thinkst Canary API☆18Updated 7 months ago
- Documentation for Zeek☆50Updated this week
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 8 months ago
- Very basic CLI SIEM (Security Information and Event Management system).☆36Updated 6 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆17Updated 5 years ago
- A Python implementation of the Community ID flow hashing standard☆23Updated last year
- Powershell scripts☆12Updated 2 years ago
- A Python based Intrusion Detection and Prevention System. Uses Scapy to sniff packets at a specific interface, extract the remote IPs, sc…☆9Updated 7 years ago
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 7 months ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆15Updated last month
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago