techge / eewids
Easily Expandable Wireless Intrusion Detection System
☆31Updated 4 years ago
Alternatives and similar repositories for eewids:
Users that are interested in eewids are comparing it to the libraries listed below
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆37Updated 4 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆52Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Linux 802.11 channel hopping utility.☆19Updated 6 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆75Updated 7 years ago
- An ARP Poisoning Defender script☆42Updated 6 years ago
- Wi-Fi tracking system for testing and demonstrational purpose☆28Updated 4 years ago
- Zenected Threat Defense VPN☆13Updated 7 years ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆20Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- OSINT tools and scripts☆56Updated 4 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆43Updated 6 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Updated 6 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆83Updated 5 years ago
- ☆14Updated 4 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 6 years ago
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps an…☆52Updated 6 years ago
- List of default passwords for Industrial Control Systems☆71Updated 7 years ago
- ☆56Updated 10 years ago
- Gets in the way of your victim's traffic and out of yours☆27Updated 5 years ago
- Malicious Link Blog☆24Updated last year