A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, credentials sent in-the-clear, and shellshock attacks. Currently supports live monitoring and network capture (pcap) scanning.
☆19Aug 8, 2018Updated 7 years ago
Alternatives and similar repositories for NetworkAlarm
Users that are interested in NetworkAlarm are comparing it to the libraries listed below
Sorting:
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- TCP及UDP的发包程序☆10Mar 18, 2019Updated 6 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Data Commander is a front-end for SQL and other databases. The program has a plugin architecture for adding arbitrary data providers.☆11Feb 23, 2026Updated last week
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- A Postgres migrations tool with an emphasis on safety and transparency☆10Jun 1, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- 京东评论,情感分析,LDA,决策树,评论爬取,Python,emotional analysis of e-commerce comments☆13May 14, 2023Updated 2 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Jan 4, 2018Updated 8 years ago
- record metrics and logs☆10Apr 2, 2018Updated 7 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated 2 weeks ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- A lightweight http server for linux☆17Jun 1, 2025Updated 9 months ago
- ☆11Jan 5, 2022Updated 4 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- 解析PE文件,对PE文件进行静态变形,简单的加密壳。☆10Dec 26, 2020Updated 5 years ago
- Unofficial mirror of haproxy-1.5 repository☆12Mar 25, 2016Updated 9 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- ☆10Mar 5, 2018Updated 8 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- ArduiPi is a shield for Raspberry Pi that brings Arduino low level extented I/O to Raspberry Pi☆24Mar 22, 2014Updated 11 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Set of tools for viral metagenomics.☆14Jan 21, 2026Updated last month
- Tools to help golang projects audit dependencies, check licenses, and create bill-of-materials☆16Jul 31, 2017Updated 8 years ago
- Swiss Army knife for arbitrarily structured binary files☆10Jun 12, 2019Updated 6 years ago
- ☆13Jul 24, 2023Updated 2 years ago
- A security tool designed to perform thorough scans on a target using OpenVAS, Zap, and Nexpose. It seamlessly consolidates and integrates…☆46Feb 11, 2026Updated 3 weeks ago
- Owncast package for YunoHost☆13Jan 11, 2026Updated last month