syncpoint / ODINLinks
Open Source C2IS (Command and Control Information System)
☆65Updated last year
Alternatives and similar repositories for ODIN
Users that are interested in ODIN are comparing it to the libraries listed below
Sorting:
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated last week
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆24Updated 8 months ago
- ADDVulcan 2020 Hack-A-Sat writeups☆27Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated last year
- ☆80Updated 2 years ago
- A repository to showcase demonstrations, prototypes and proofs of concept from the Defense Solutions Team.☆22Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- Collaborative Development for NATO and US Message Text Format Military Standards.☆27Updated 5 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆58Updated 2 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last month
- A tool to search Aviation-related intelligence from public sources. Aviation OSINT☆36Updated 3 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆72Updated 2 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Updated last month
- QGIS Tools to capture and zoom to MGRS coordinates.☆23Updated last year
- Open YARA scan- and search engine☆24Updated 7 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- DDS workshops at DEFCON☆80Updated last year
- A simple simulator for modeling earth-to-space RFI attacks. Demonstrated at DEFCON 30.☆31Updated 2 years ago
- Use md5-collisions to make evil executables looking like a good one.☆31Updated 5 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Maltego local and server integration for OpenCTI☆32Updated last year
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- A collection of learning resources for budding aviation security researchers☆95Updated 5 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 7 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago