sleetymattgeorge / SNORT-GUILinks
SNORT GUI: sniff sniffs the baddies and helps you setup SNORT ids in your network
☆28Updated 6 months ago
Alternatives and similar repositories for SNORT-GUI
Users that are interested in SNORT-GUI are comparing it to the libraries listed below
Sorting:
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆77Updated 3 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆105Updated last year
- Simple Malware Scanner written in python☆91Updated 9 months ago
- The best tools and resources for forensic analysis.☆168Updated 2 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆58Updated 2 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆121Updated 2 years ago
- Automation script to download missing tools and configurate kali linux for various cybersecurity categories☆54Updated 3 months ago
- Low Interaction Mobile Honeypot☆97Updated 7 months ago
- ☆62Updated 6 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆75Updated last year
- Source of swisskyrepo.github.io - Public☆27Updated 6 months ago
- Small collection of Ransomware organized by family.☆270Updated last year
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Updated 3 years ago
- Capture screenshots of onion services on an onion service.☆73Updated last year
- A machine learning malware analysis framework for Android apps.☆136Updated last year
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆22Updated 4 years ago
- Website defacement attack detection with deep learning☆62Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 3 years ago
- A list of attacks or malware using steganography or information hiding☆70Updated last month
- List of some cybersecurity conferences☆59Updated 2 weeks ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆45Updated 3 months ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 4 months ago
- on-the-fly☆86Updated last year
- A curated list of awesome binary analysis automation training, resources, and tools.☆54Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year