ymirsky / VesperLinks
A man in the middle detection tool for LANs
☆27Updated 2 years ago
Alternatives and similar repositories for Vesper
Users that are interested in Vesper are comparing it to the libraries listed below
Sorting:
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆96Updated 4 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆147Updated 10 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76Updated last year
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆43Updated 5 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- A honeypot for malware that propagates via USB storage devices☆102Updated 10 years ago
- Rogue AP killer☆91Updated 8 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- The Stratosphere IPS is a free software IPS that uses network behavior to detect and block malicious actions.☆33Updated 9 years ago
- Passive DHCP fingerprinting implementation☆52Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆159Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆27Updated 6 years ago
- An ARP Poisoning Defender script☆42Updated 7 years ago
- ☆16Updated 9 years ago
- NTP logger/honeypot☆55Updated 11 years ago
- SCTP network scanner for discovery and security☆94Updated 4 years ago
- Repository for Tor's DNS-related issues.☆17Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Updated 4 years ago
- A python library to extract TCP sessions from PCAPs.☆24Updated 5 years ago
- ☆52Updated 2 weeks ago
- iSEC Partners' research publications☆76Updated 9 years ago