ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+9142.67%)
PoW-ShieldProject dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (+32%)
TrackerjackerLike nmap for mapping wifi networks you're not connected to, plus device tracking
Stars: ✭ 2,307 (+2976%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+3008%)
BrightidReference mobile app for BrightID
Stars: ✭ 101 (+34.67%)
BatfishBatfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Stars: ✭ 592 (+689.33%)
NoiseA decentralized P2P networking stack written in Go.
Stars: ✭ 1,695 (+2160%)
Zxrequestblock基于NSURLProtocol一句话实现iOS应用底层所有网络请求拦截(含网页ajax请求拦截【不支持WKWebView】)、一句话实现防抓包(使Thor,Charles,Burp等代理抓包方式全部失效,且即使开启了代理,也不影响App内部的正常请求)。包含http-dns解决方法,有效防止DNS劫持。用于分析http,https请求等
Stars: ✭ 160 (+113.33%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+1590.67%)
Anubis🔓Subdomain enumeration and information gathering tool
Stars: ✭ 722 (+862.67%)
UfonetUFONet - Denial of Service Toolkit
Stars: ✭ 963 (+1184%)
OpensvpOpensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.
Stars: ✭ 50 (-33.33%)
Seal DemoDemos, Examples, Tutorials for using Microsoft SEAL library.
Stars: ✭ 63 (-16%)
SsfSecure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform
Stars: ✭ 1,157 (+1442.67%)
MasterpasswordProject moved to https://gitlab.com/spectre.app
Stars: ✭ 1,122 (+1396%)
PynmsA vendor-agnostic NMS for carrier-grade network simulation and automation
Stars: ✭ 73 (-2.67%)
Gurvygurvy implements Elliptic Curve Cryptography (+Pairing) for BLS12-381, BLS12-377, BW6-761, and BN256. Originally developed (and used) by gnark
Stars: ✭ 66 (-12%)
Vaim SmsTHIS TOOL IS FOR DDOS ATTACK ON PHONE NUMBER YOU CAN USE THIS TOOL ON YOUR KALI LINUX OR TERMUX ALSO IF IS NOT WORK THEN PLEASE CONTACT ME IN "VAIMPIER RITIK" YOUTUBE CHANNEL THANKYOU FOR COMING HERE ......
Stars: ✭ 62 (-17.33%)
Exonum ClientJavaScript client for Exonum blockchain
Stars: ✭ 62 (-17.33%)
Halfrost Field✍🏻 这里是写博客的地方 —— Halfrost-Field 冰霜之地
Stars: ✭ 10,414 (+13785.33%)
WaykichainPublic Blockchain as a Decentralized Finance Infrastructure Service Platform
Stars: ✭ 1,117 (+1389.33%)
ConstantineConstant time pairing-based or elliptic curve based cryptography and digital signatures
Stars: ✭ 61 (-18.67%)
LibblsBLS signatures, threshold encryption, distributed key generation library in modern C++. Actively maintained and used by SKALE for consensus, distributed random number gen, inter-chain communication and protection of transactions. BLS threshold signatures can be verified in Solidity, and used as random beacon (common coin)
Stars: ✭ 74 (-1.33%)
Cisco iosAnsible Network Cisco IOS Provider Role
Stars: ✭ 72 (-4%)
Train Ai With Django Swagger JwtTrain AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Stars: ✭ 66 (-12%)
RaazCryptographic library for Haskell
Stars: ✭ 60 (-20%)
IotsharkIotShark - Monitoring and Analyzing IoT Traffic
Stars: ✭ 69 (-8%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+1400%)
DnaDiscourse Network Analyzer (DNA)
Stars: ✭ 73 (-2.67%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (+1397.33%)
BabasslA Brisk and Better Assured Cryptographic Toolkit
Stars: ✭ 68 (-9.33%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-16%)
Ansible For Network EngineersРепозиторий книги "Ansible для сетевых инженеров". Книга в процессе переноса на readthedocs и обновления содержания на Ansible 2.9!
Stars: ✭ 74 (-1.33%)
MthawkeyeProfiling / Debugging assist tools for iOS. (Memory Leak, OOM, ANR, Hard Stalling, Network, OpenGL, Time Profile ...)
Stars: ✭ 1,119 (+1392%)
Crypto BenchBenchmarks for crypto libraries (in Rust, or with Rust bindings)
Stars: ✭ 67 (-10.67%)
ShadowcloudUniversal cloud storage client
Stars: ✭ 62 (-17.33%)
Tinybirdnet UnityA high level API for making networked games in Unity, utilizes https://github.com/RevenantX/LiteNetLib
Stars: ✭ 72 (-4%)
QuantumgateQuantumGate is a peer-to-peer (P2P) communications protocol, library and API written in C++.
Stars: ✭ 62 (-17.33%)
CryptoswiftCryptoSwift is a growing collection of standard and secure cryptographic algorithms implemented in Swift
Stars: ✭ 8,846 (+11694.67%)
Spruce NetworkDecentralized peer-to-peer mesh network.
Stars: ✭ 61 (-18.67%)
JsprintmanagerAdvanced Client-side Printing & Scanning Solution for Javascript
Stars: ✭ 74 (-1.33%)
CollieAn asynchronous event-driven network framework( port netty ) written in D.
Stars: ✭ 60 (-20%)
Awesome I2pA curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
Stars: ✭ 66 (-12%)
BrambleBramble is a hacking Open source suite.
Stars: ✭ 60 (-20%)
SavjeecoinA simple blockchain in Javascript. For educational purposes only.
Stars: ✭ 1,097 (+1362.67%)
VeracruzMain repository for the Veracruz privacy-preserving compute project.
Stars: ✭ 71 (-5.33%)
PypinksignPinkSign – a friendly Python library for NPKI (공인인증서) certificates 🔑
Stars: ✭ 65 (-13.33%)
MinisignA dead simple tool to sign files and verify digital signatures.
Stars: ✭ 1,105 (+1373.33%)
Pcapxray❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+1361.33%)
OscpyAn efficient OSC implementation compatible with python2.7 and 3.5+
Stars: ✭ 65 (-13.33%)
ConnectivityDetect if the network is up (do we have connectivity?)
Stars: ✭ 58 (-22.67%)
Dnscrypt MenuManage DNSCrypt from the macOS menu bar (BitBar plugin)
Stars: ✭ 59 (-21.33%)
I2p.i2pI2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Stars: ✭ 1,186 (+1481.33%)
Serial StudioMulti-purpose serial data visualization & processing program
Stars: ✭ 1,168 (+1457.33%)
Go Out☄️ go-out - A Golang egress buster.
Stars: ✭ 65 (-13.33%)
Coniks JavaA CONIKS implementation in Java
Stars: ✭ 58 (-22.67%)
AvenueWrapper around URLSession and URLSessionTask to enable seamless integration with Operation / OperationQueue.
Stars: ✭ 58 (-22.67%)