thepacketgeek / meteorshark
Packet Sniffing in the Cloud
☆36Updated 5 years ago
Alternatives and similar repositories for meteorshark:
Users that are interested in meteorshark are comparing it to the libraries listed below
- Sniff packets and POST to API☆15Updated last year
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Python pcap sanitizer☆21Updated 2 years ago
- Onion Salt git Repo☆28Updated 4 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Python client for the whois.cymru.com service☆44Updated 8 years ago
- Tool for scanning Cisco router products over SSH☆56Updated 10 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 6 years ago
- Snort in a Docker Container☆31Updated 11 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Updated 10 years ago
- ☆47Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- YAPDNS☆39Updated 9 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆43Updated 6 years ago
- IP Address to ASN/prefix/owner/cc lookup server☆29Updated 5 years ago
- Some scripts for Scapy☆26Updated 2 years ago
- ☆49Updated 9 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Docker configs and build scripts.☆22Updated 10 years ago
- Prometheus Firewall Analyzer☆47Updated 9 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Repository for Security Workshop content☆20Updated 7 years ago