All Projects → Blackhat Python3 → Similar Projects or Alternatives

429 Open source projects that are alternatives of or similar to Blackhat Python3

Violent Python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (-46.4%)
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-96.62%)
Mutual labels:  cybersecurity, network-security
Pythoncode Tutorials
The Python Code Tutorials
Stars: ✭ 544 (-51.64%)
SuperLibrary
Information Security Library
Stars: ✭ 60 (-94.67%)
Mutual labels:  cybersecurity, network-security
Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (-44.71%)
Mutual labels:  cybersecurity, network-security
PoW-Shield
Project dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (-91.2%)
Mutual labels:  cybersecurity, network-security
Network Intrusion Detection
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
Stars: ✭ 303 (-73.07%)
Mutual labels:  cybersecurity, network-security
Anubis
🔓Subdomain enumeration and information gathering tool
Stars: ✭ 722 (-35.82%)
Mutual labels:  network-security
Netscan2
active / passive network scanner
Stars: ✭ 27 (-97.6%)
Mutual labels:  cybersecurity
Sentinel Attack
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (-39.91%)
Mutual labels:  cybersecurity
Jackhammer
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (-43.73%)
Mutual labels:  network-security
Packer Fuzzer
Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (-33.07%)
Mutual labels:  cybersecurity
Passhunt
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (-14.58%)
Mutual labels:  cybersecurity
H1st
The AI Application Platform We All Need. Human AND Machine Intelligence. Based on experience building AI solutions at Panasonic: robotics predictive maintenance, cold-chain energy optimization, Gigafactory battery mfg, avionics, automotive cybersecurity, and more.
Stars: ✭ 697 (-38.04%)
Mutual labels:  cybersecurity
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-95.47%)
Mutual labels:  cybersecurity
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+511.73%)
Mutual labels:  cybersecurity
Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (-22.93%)
Mutual labels:  cybersecurity
Pcapxray
❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (-2.58%)
Mutual labels:  cybersecurity
Awesome Security Hardening
A collection of awesome security hardening guides, tools and other resources
Stars: ✭ 630 (-44%)
Mutual labels:  cybersecurity
Smersh
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (-96.18%)
Mutual labels:  cybersecurity
Walkoff
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
Stars: ✭ 855 (-24%)
Mutual labels:  cybersecurity
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (-46.31%)
Mutual labels:  cybersecurity
Batfish
Batfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Stars: ✭ 592 (-47.38%)
Mutual labels:  network-security
Microsoft 365 Defender Hunting Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
Stars: ✭ 922 (-18.04%)
Mutual labels:  cybersecurity
Amass
In-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+458.58%)
Mutual labels:  network-security
Opcde
OPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (-52.18%)
Mutual labels:  cybersecurity
Scapy
Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+516.18%)
Mutual labels:  network-security
Grab.js
fast TCP banner grabbing with node.js
Stars: ✭ 33 (-97.07%)
Mutual labels:  cybersecurity
Bypass Firewalls By Dns History
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (-34.31%)
Mutual labels:  network-security
Project Tauro
A Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-95.38%)
Mutual labels:  network-security
Memlabs
Educational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (-38.13%)
Mutual labels:  cybersecurity
Citadelcore
Cross platform filtering HTTP/S proxy based on .NET Standard 2.0.
Stars: ✭ 28 (-97.51%)
Mutual labels:  network-programming
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-39.82%)
Mutual labels:  cybersecurity
Zile
Extract API keys from file or url using by magic of python and regex.
Stars: ✭ 61 (-94.58%)
Mutual labels:  cybersecurity
Sharppcap
Official repository - Fully managed, cross platform (Windows, Mac, Linux) .NET library for capturing packets
Stars: ✭ 665 (-40.89%)
Mutual labels:  network-programming
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-98.13%)
Mutual labels:  cybersecurity
Dawnscanner
Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
Stars: ✭ 642 (-42.93%)
Mutual labels:  cybersecurity
Unified Cybersecurity Ontology
Unified Cybersecurity Ontology
Stars: ✭ 44 (-96.09%)
Mutual labels:  cybersecurity
Ubernet
Flexible networking library for Unity
Stars: ✭ 10 (-99.11%)
Mutual labels:  network-programming
Node Opcua
an implementation of a OPC UA stack fully written in javascript and nodejs - http://node-opcua.github.io/
Stars: ✭ 985 (-12.44%)
Mutual labels:  cybersecurity
Probe spider
Probe_Spider is a Open Source Intelligence Tool made complete out of Python.
Stars: ✭ 20 (-98.22%)
Mutual labels:  cybersecurity
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (-53.96%)
Mutual labels:  cybersecurity
Intelmq
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-45.69%)
Mutual labels:  cybersecurity
Dfw1n Osint
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-94.4%)
Mutual labels:  cybersecurity
Python Programming
Python Coding - Data Structure, Algorithm, Crypto, Web, Network, System
Stars: ✭ 9 (-99.2%)
Mutual labels:  network-programming
Recommendations for engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 39 (-96.53%)
Mutual labels:  cybersecurity
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (-51.91%)
Mutual labels:  cybersecurity
Csp
The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing confidence and trust among the national Computer Security Incident Response Teams (CSIRTs) of the Member States and for promoting swift and effective operational cooperation.
Stars: ✭ 23 (-97.96%)
Mutual labels:  cybersecurity
Thc Hydra
hydra
Stars: ✭ 5,645 (+401.78%)
Mutual labels:  network-security
Gev
🚀Gev is a lightweight, fast non-blocking TCP network library based on Reactor mode. Support custom protocols to quickly and easily build high-performance servers.
Stars: ✭ 1,082 (-3.82%)
Mutual labels:  network-programming
Riceteacatpanda
repo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-98.4%)
Mutual labels:  cybersecurity
Yasuo
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-54.04%)
Mutual labels:  network-security
Car
Cyber Analytics Repository
Stars: ✭ 490 (-56.44%)
Mutual labels:  cybersecurity
Tkeed
🌎 High Performance HTTP WebServer
Stars: ✭ 485 (-56.89%)
Mutual labels:  network-programming
Xdp
Package xdp allows one to use XDP sockets from the Go programming language.
Stars: ✭ 36 (-96.8%)
Mutual labels:  network-programming
Attack Navigator
Web app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (-21.16%)
Mutual labels:  cybersecurity
Quiche
🥧 Savoury implementation of the QUIC transport protocol and HTTP/3
Stars: ✭ 5,481 (+387.2%)
Mutual labels:  network-programming
Captfencoder
CaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。
Stars: ✭ 473 (-57.96%)
Mutual labels:  network-security
Vuldash
Vulnerability Dashboard
Stars: ✭ 16 (-98.58%)
Mutual labels:  cybersecurity
Robust Adv Malware Detection
Code repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (-94.4%)
Mutual labels:  cybersecurity
1-60 of 429 similar projects