RespounderRespounder detects presence of responder in the network.
RubyfuRubyfu, where Ruby goes evil!
ZbangzBang is a risk assessment tool that detects potential privileged account threats
MercuryMercury: network metadata capture and analysis
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
3proxy3proxy - tiny free proxy server
Zxrequestblock基于NSURLProtocol一句话实现iOS应用底层所有网络请求拦截(含网页ajax请求拦截【不支持WKWebView】)、一句话实现防抓包(使Thor,Charles,Burp等代理抓包方式全部失效,且即使开启了代理,也不影响App内部的正常请求)。包含http-dns解决方法,有效防止DNS劫持。用于分析http,https请求等
NetpwnTool made to automate tasks of pentesting.
Netsec Ps ScriptsCollection of PowerShell network security scripts for system administrators.
Train Ai With Django Swagger JwtTrain AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Project TauroA Router WiFi key recovery/cracking tool with a twist.
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Bypass Firewalls By Dns HistoryFirewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Anubis🔓Subdomain enumeration and information gathering tool
JackhammerJackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Violent Python3Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
BatfishBatfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
AmassIn-depth Attack Surface Mapping and Asset Discovery
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
CaptfencoderCaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Appinfoscanner一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
QnsmQNSM is network security monitoring framework based on DPDK.
CyberscanCyberScan: Network's Forensics ToolKit
FpndPython package for freepn network daemon
Hack-UtilsScript to facilitate different functions and checks
pycommunityidA Python implementation of the Community ID flow hashing standard
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
what-vpnIdentify servers running various SSL VPNs based on protocol-specific behaviors
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
network-pipelineNetwork traffic data pipeline for real-time predictions and building datasets for deep neural networks
pdns-qofPassive DNS Common Output Format
tariqHybrid Port Knocking System
BGP-RankingBGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)
aflnwAFLNW: network wrapper for AFL
3proxy3proxy - tiny free proxy server
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
PoW-ShieldProject dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
monopticonMonitor ethernet traffic in real time with a 3D backend.
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
community-id-specAn open standard for hashing network flows into identifiers, a.k.a "Community IDs".
masscannedLet's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.