stamparm / tsusen
Network traffic sensor
☆110Updated 2 years ago
Alternatives and similar repositories for tsusen:
Users that are interested in tsusen are comparing it to the libraries listed below
- TinySHell port to SCTP☆124Updated 11 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Masscan integrated with Shodan API☆41Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆62Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- a more complex ransomware honeypot☆122Updated 9 years ago
- Subdomain Analyzer☆76Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- ☆47Updated 8 years ago
- Suricata rules for Emerging Threats and funkyness☆74Updated 7 years ago
- Rogue AP killer☆89Updated 7 years ago
- Terminal Service (RDP) Security Editor☆47Updated 7 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- A Network Inspection Tool☆81Updated 7 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆77Updated 7 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago