avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (-75.86%)
3proxy3proxy - tiny free proxy server
Stars: ✭ 2,493 (+974.57%)
Hack-UtilsScript to facilitate different functions and checks
Stars: ✭ 27 (-88.36%)
Violent Python3Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (+159.91%)
pdns-qofPassive DNS Common Output Format
Stars: ✭ 30 (-87.07%)
Train Ai With Django Swagger JwtTrain AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Stars: ✭ 66 (-71.55%)
monopticonMonitor ethernet traffic in real time with a 3D backend.
Stars: ✭ 57 (-75.43%)
Appinfoscanner一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (+82.76%)
CyberscanCyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (+20.69%)
JackhammerJackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+172.84%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-83.62%)
Netsec Ps ScriptsCollection of PowerShell network security scripts for system administrators.
Stars: ✭ 139 (-40.09%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-75.43%)
AmassIn-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+2608.62%)
BGP-RankingBGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)
Stars: ✭ 49 (-78.88%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+904.74%)
PoW-ShieldProject dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (-57.33%)
CaptfencoderCaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。
Stars: ✭ 473 (+103.88%)
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (-86.21%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-77.59%)
community-id-specAn open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Stars: ✭ 137 (-40.95%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+48.71%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+1409.91%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-74.14%)
Anubis🔓Subdomain enumeration and information gathering tool
Stars: ✭ 722 (+211.21%)
FpndPython package for freepn network daemon
Stars: ✭ 271 (+16.81%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-34.48%)
pycommunityidA Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-92.24%)
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+168.1%)
what-vpnIdentify servers running various SSL VPNs based on protocol-specific behaviors
Stars: ✭ 24 (-89.66%)
MercuryMercury: network metadata capture and analysis
Stars: ✭ 203 (-12.5%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (-39.66%)
BatfishBatfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Stars: ✭ 592 (+155.17%)
network-pipelineNetwork traffic data pipeline for real-time predictions and building datasets for deep neural networks
Stars: ✭ 36 (-84.48%)
tariqHybrid Port Knocking System
Stars: ✭ 20 (-91.38%)
aflnwAFLNW: network wrapper for AFL
Stars: ✭ 21 (-90.95%)
ZbangzBang is a risk assessment tool that detects potential privileged account threats
Stars: ✭ 224 (-3.45%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-67.67%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+122.84%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+384.91%)
testmynids.orgA website and framework for testing NIDS detection
Stars: ✭ 55 (-76.29%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+84.05%)
3proxy3proxy - tiny free proxy server
Stars: ✭ 2,263 (+875.43%)
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+1068.97%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+52.16%)
masscannedLet's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
Stars: ✭ 50 (-78.45%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+2887.93%)
QnsmQNSM is network security monitoring framework based on DPDK.
Stars: ✭ 334 (+43.97%)
RubyfuRubyfu, where Ruby goes evil!
Stars: ✭ 228 (-1.72%)
Zxrequestblock基于NSURLProtocol一句话实现iOS应用底层所有网络请求拦截(含网页ajax请求拦截【不支持WKWebView】)、一句话实现防抓包(使Thor,Charles,Burp等代理抓包方式全部失效,且即使开启了代理,也不影响App内部的正常请求)。包含http-dns解决方法,有效防止DNS劫持。用于分析http,https请求等
Stars: ✭ 160 (-31.03%)
Bypass Firewalls By Dns HistoryFirewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (+218.53%)