secdev / awesome-scapyLinks
Great packages that use Scapy
☆293Updated 2 weeks ago
Alternatives and similar repositories for awesome-scapy
Users that are interested in awesome-scapy are comparing it to the libraries listed below
Sorting:
- A curated list of awesome things related to Suricata☆180Updated 3 months ago
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆540Updated 8 months ago
- A curated list of awesome malware persistence tools and resources.☆224Updated 6 months ago
- A command-line network packet crafting and injection utility☆515Updated last year
- A curated collection of awesome malware, botnets, and other post-exploitation tools.☆256Updated 4 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆343Updated last year
- a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE☆469Updated 6 months ago
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆893Updated last year
- awesome-linux-rootkits☆1,861Updated 5 months ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,213Updated 4 years ago
- List of Bluetooth BR/EDR/LE security resources☆559Updated last year
- ☆313Updated 11 months ago
- A workshop on Packet Crafting using Scapy.☆157Updated 4 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- A collection of awesome resources related to 802.11 security, tools and other things☆166Updated 6 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,781Updated last year
- A collection of sources of indicators of compromise.☆876Updated last month
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆279Updated 9 years ago
- A curated list of awesome embedded and IoT security resources.☆2,022Updated last year
- A framework for layer 2 attacks☆780Updated last year
- A curated list of security card games.☆134Updated 3 weeks ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆174Updated 6 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆421Updated 3 years ago
- Tools & Resources for Cyber Security Operations☆233Updated last month
- List of Awesome Advanced Windows Exploitation References☆1,497Updated 3 years ago
- 🔒 A collection of cheatsheets for various infosec tools and topics.☆1,331Updated 3 years ago
- Security-oriented list of resources about industrial network protocols.☆574Updated 2 weeks ago
- packet captures of real-world ddos attacks☆163Updated 3 years ago
- ☆618Updated 3 months ago
- Repository containing useful links for all things Physical Security. Please contribute!☆91Updated 4 years ago