secdev / scapytainLinks
Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.
☆19Updated 7 years ago
Alternatives and similar repositories for scapytain
Users that are interested in scapytain are comparing it to the libraries listed below
Sorting:
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- ☆54Updated 2 weeks ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Decrypts Cisco VPN Group Passwords☆18Updated 14 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- External plugins for examples, experimental, and some legacy code.☆43Updated 2 weeks ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 12 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- Wireshark regression tests☆11Updated 5 years ago
- ☆17Updated last year
- Dragon Sandbox☆79Updated 12 years ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.☆48Updated 4 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- A forensic system baselining, searching, and evidence collection tool☆19Updated 6 years ago
- Network Tools☆34Updated 2 years ago
- Phishing Toolkit☆19Updated 7 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Updated 2 years ago
- apbleed☆23Updated 11 years ago
- Python pcap sanitizer☆21Updated 3 years ago
- pcapdj - dispatch pcap files☆46Updated 5 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆25Updated 4 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 6 years ago
- A USB armory based USB sandbox☆22Updated 8 years ago