syncpoint / ODINLinks
Open Source C2IS (Command and Control Information System)
☆65Updated last year
Alternatives and similar repositories for ODIN
Users that are interested in ODIN are comparing it to the libraries listed below
Sorting:
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆24Updated 3 weeks ago
- A repository to showcase demonstrations, prototypes and proofs of concept from the Defense Solutions Team.☆22Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated last week
- ADDVulcan 2020 Hack-A-Sat writeups☆27Updated 2 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 months ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- Collaborative Development for NATO and US Message Text Format Military Standards.☆27Updated 5 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 2 years ago
- ☆80Updated 2 years ago
- A collection of learning resources for budding aviation security researchers☆95Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 5 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- A rogue DNS detector☆24Updated 2 months ago
- OpenAthena allows common drones to spot precise geodetic locations☆100Updated last year
- Graph visualization of wireless client and access point relationships☆117Updated 2 years ago
- Open YARA scan- and search engine☆24Updated 7 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- Useful commands for infosec☆29Updated 2 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- ☆14Updated last year
- Clone network interface from one host as a tap interface on another host☆60Updated 4 years ago
- (RETIRED) MIL-STD-2525 B and C rendering library and web service. Check https://missioncommand.github.io/ for new mil-std-2525 rendering…☆72Updated 3 weeks ago
- ☆14Updated 7 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 11 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago