A cross-platform programmable network tool
-
Updated
Jun 11, 2024 - Go
A cross-platform programmable network tool
Scapy: the Python-based interactive packet manipulation program & library.
The Python Code Tutorials
In-depth attack surface mapping and asset discovery
Next generation web scanner
3proxy - tiny free proxy server
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, etc.
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
WireGuard®-based zero-trust access platform with OIDC auth, identity sync, and NAT traversal.
Best practices for segmentation of the corporate network of any company
A Suricata based IDS/IPS/NSM distro
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
a drop-in replacement for Nmap powered by shodan.io
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
Batfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Add a description, image, and links to the network-security topic page so that developers can more easily learn about it.
To associate your repository with the network-security topic, visit your repo's landing page and select "manage topics."