Network traffic sensor
☆115Jun 8, 2022Updated 3 years ago
Alternatives and similar repositories for tsusen
Users that are interested in tsusen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network white noise collector☆19Mar 23, 2016Updated 10 years ago
- Telnet Honeypot☆163Mar 5, 2019Updated 7 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆352Jan 12, 2023Updated 3 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Damn Small FI Scanner☆62Nov 13, 2019Updated 6 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 9 years ago
- Check UNIX/Linux systems for privilege escalation☆126Mar 31, 2016Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- Capturing, analysing and responding to cyber attacks☆173Sep 13, 2024Updated last year
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- Db Database Assessment Tool☆211Jun 26, 2018Updated 7 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Get information client with getdatareport (Plugin)☆25Oct 18, 2016Updated 9 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Apr 20, 2020Updated 5 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago