stamparm / tsusen
Network traffic sensor
☆111Updated 2 years ago
Alternatives and similar repositories for tsusen:
Users that are interested in tsusen are comparing it to the libraries listed below
- TinySHell port to SCTP☆125Updated 11 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 5 years ago
- Terminal Service (RDP) Security Editor☆47Updated 7 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Simple UDP honeypot script☆48Updated last year
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Suricata rules for Emerging Threats and funkyness☆74Updated 7 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- a more complex ransomware honeypot☆122Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆102Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆63Updated 9 years ago
- Passive DNS V2☆61Updated 11 years ago
- observation camera honeypot☆50Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Honeypot deployment made easy☆235Updated 6 years ago