secdev / awesome-scapy
Great packages that use Scapy
☆272Updated 6 months ago
Alternatives and similar repositories for awesome-scapy:
Users that are interested in awesome-scapy are comparing it to the libraries listed below
- A curated collection of awesome malware, botnets, and other post-exploitation tools.☆253Updated 4 years ago
- A curated list of awesome things related to Suricata☆157Updated 3 weeks ago
- ☆302Updated 8 months ago
- A curated list of awesome SNMP libraries, tools, and other resources.☆137Updated 4 months ago
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆519Updated 5 months ago
- List of Bluetooth BR/EDR/LE security resources☆541Updated last year
- A curated list of awesome tools, research, papers and other projects related to password cracking and password security.☆717Updated 2 months ago
- Labtainers: A Docker-based cyber lab framework☆280Updated last month
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,546Updated 2 years ago
- Security-oriented list of resources about industrial network protocols.☆543Updated this week
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆839Updated last year
- Wireshark Cheat Sheet☆388Updated 4 years ago
- A workshop on Packet Crafting using Scapy.☆155Updated 4 years ago
- A curated list of security card games.☆122Updated last year
- awesome-linux-rootkits☆1,798Updated 2 months ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,180Updated 4 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,710Updated last year
- wireshark + boundary IPFIX decode patches☆226Updated 6 years ago
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆267Updated 8 years ago
- a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE☆439Updated 3 months ago
- A compiled list of tools for reconnaissance and footprinting☆117Updated 6 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆410Updated 2 years ago
- A curated list of awesome Memory Forensics for DFIR☆408Updated last month
- This repository is for tools, guides, cheatsheets, and anything else related to learning all different aspects of security.☆90Updated 2 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,192Updated 10 months ago
- A collection of sources of indicators of compromise.☆840Updated 5 months ago
- random project☆128Updated 4 years ago
- Repository containing useful links for all things Physical Security. Please contribute!☆87Updated 3 years ago
- A Swiss army knife for your daily Linux network plumbing.☆1,300Updated 2 months ago
- A curated list of awesome reverse engineering resources for various topics☆513Updated 7 months ago