ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+7036.84%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+6034.21%)
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+1536.84%)
ZeekZeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Stars: ✭ 4,180 (+10900%)
zeek-docsDocumentation for Zeek
Stars: ✭ 41 (+7.89%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+15065.79%)
testmynids.orgA website and framework for testing NIDS detection
Stars: ✭ 55 (+44.74%)
pycommunityidA Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-52.63%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+60.53%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+18936.84%)
community-id-specAn open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Stars: ✭ 137 (+260.53%)
packet cafeA platform built for easy-to-use automated network traffic analysis
Stars: ✭ 40 (+5.26%)
PoseidonPoseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict the type of device.
Stars: ✭ 310 (+715.79%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+18142.11%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+302.63%)
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+168.42%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+0%)
arpwitchA modern arpwatch replacement with JSON formatted outputs and easy options to exec commands when network changes are observed.
Stars: ✭ 20 (-47.37%)
JxnetJxnet is a Java library for capturing and sending custom network packet buffers with no copies. Jxnet wraps a native packet capture library (libpcap/winpcap/npcap) via JNI (Java Native Interface).
Stars: ✭ 26 (-31.58%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (+3413.16%)
cuc-wiki个人教学 Wiki
Stars: ✭ 83 (+118.42%)
brimcapConvert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
Stars: ✭ 22 (-42.11%)
D1ProxyA simple yet powerful Java 11 TCP MITM proxy for Dofus 1.29.1
Stars: ✭ 17 (-55.26%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+268.42%)
JoincapMerge multiple pcap files together, gracefully.
Stars: ✭ 159 (+318.42%)
PasserPassive service locator, a python sniffer that identifies servers, clients, names and much more
Stars: ✭ 144 (+278.95%)
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (-21.05%)
d4-coreD4 core software (server and sample sensor client)
Stars: ✭ 40 (+5.26%)
masscannedLet's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
Stars: ✭ 50 (+31.58%)
PackagesThe default package source of the Zeek Package Manager
Stars: ✭ 94 (+147.37%)
pcapdjpcapdj - dispatch pcap files
Stars: ✭ 41 (+7.89%)
telemetryOpen-source datasets for anyone interested in working with network anomaly based machine learning, data science and research
Stars: ✭ 93 (+144.74%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+694.74%)
MegaDevBro IDS + ELK Stack to detect and block data exfiltration
Stars: ✭ 46 (+21.05%)
attack to verisThe principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+47.37%)
opensnitchOpenSnitch is a GNU/Linux application firewall
Stars: ✭ 398 (+947.37%)
NetworkAlarmA tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, credentials sent in-the-clear, and shellshock attacks. Currently supports live monitoring and network capture (pcap) scanning.
Stars: ✭ 17 (-55.26%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (+57.89%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+50%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+655.26%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+165.79%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+128.95%)
PoW-ShieldProject dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (+160.53%)
ssldumpssldump - (de-facto repository gathering patches around the cyberspace)
Stars: ✭ 160 (+321.05%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+1052.63%)
graylog-zeek-content-packBRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to capture and index BRO/Zeek logs coming from a remote sensor.
Stars: ✭ 18 (-52.63%)
BGP-RankingBGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)
Stars: ✭ 49 (+28.95%)
network-pipelineNetwork traffic data pipeline for real-time predictions and building datasets for deep neural networks
Stars: ✭ 36 (-5.26%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-42.11%)
flow-indexerFlow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files
Stars: ✭ 43 (+13.16%)
cyberopsCisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-52.63%)