syncpoint / ODINLinks
Open Source C2IS (Command and Control Information System)
☆65Updated last year
Alternatives and similar repositories for ODIN
Users that are interested in ODIN are comparing it to the libraries listed below
Sorting:
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Updated 5 months ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated last month
- A mini project to exfiltrate data via QR codes☆19Updated last month
- A repository to showcase demonstrations, prototypes and proofs of concept from the Defense Solutions Team.☆21Updated 10 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆28Updated 4 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Provides bulk nominatim geocoding for QGIS☆38Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- DDS workshops at DEFCON☆77Updated 11 months ago
- Collaborative Development for NATO and US Message Text Format Military Standards.☆26Updated 5 years ago
- hackasat-qualifier-2023☆26Updated 2 years ago
- ☆80Updated 2 years ago
- ☆14Updated 9 months ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur☆19Updated 2 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Use md5-collisions to make evil executables looking like a good one.☆30Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Updated 4 years ago
- Recordization library☆9Updated 2 weeks ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 2 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Graph visualization of wireless client and access point relationships☆118Updated 2 years ago