network-security
Here are 469 public repositories matching this topic...
In-depth Attack Surface Mapping and Asset Discovery
-
Updated
Jun 1, 2022 - Go
I testing bruteforce my opencart store.
this is body request:
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="username"
^USER^
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="password"
^PASS^
-----------------------------34237939373614592773956005873
Content-Disposition: form-dat
Next generation web scanner
-
Updated
Feb 5, 2022 - Ruby
3proxy - tiny free proxy server
-
Updated
May 19, 2022 - C
WireGuard®-based VPN server and firewall
-
Updated
Jun 1, 2022 - Elixir
a drop-in replacement for Nmap powered by shodan.io
-
Updated
Apr 24, 2022 - Go
Level four can be achieved with only one physical computer on your desktop. One can use virtual machines and call it a Privileged Access Workstation: https://techcommunity.microsoft.com/t5/data-center-security/privileged-access-workstation-paw/ba-p/372274
It hurts a little less than two physical computers. ;)
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
-
Updated
Feb 11, 2022 - Python
The Python Code Tutorials
-
Updated
May 31, 2022 - Jupyter Notebook
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
-
Updated
Aug 31, 2021 - Python
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
-
Updated
Jun 2, 2021 - Shell
-
Updated
May 15, 2022 - Python
NFStream: a Flexible Network Data Analysis Framework.
-
Updated
Apr 28, 2022 - Python
Captfencoder is a rapid cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools.
-
Updated
Jun 1, 2022 - JavaScript
Batfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
-
Updated
Jun 2, 2022 - Java
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
-
Updated
Sep 20, 2021 - Python
HostHunter a recon tool for discovering hostnames using OSINT techniques.
-
Updated
Sep 13, 2021 - Python
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
-
Updated
May 25, 2022 - Java
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
-
Updated
Dec 9, 2017 - Ruby
QNSM is network security monitoring framework based on DPDK.
-
Updated
Sep 27, 2021 - C
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
-
Updated
May 8, 2019 - Python
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
-
Updated
Jul 18, 2018 - Python
network reconnaissance toolkit
-
Updated
Dec 17, 2018 - Python
CyberScan: Network's Forensics ToolKit
-
Updated
Jan 23, 2019 - Python
Mercury: network metadata capture and analysis
-
Updated
May 27, 2022 - C++
So what we more or less want to accomplish here to start is this:
Adding the debian/* (ubuntu/, fedora/, etc.) folders and the docker setup to each (dependency) pkg's respective git repo (so nanoservice, python-nanomsg, etc.).
Probably makes sense to pick off one or two of these dependencies to start, then fork the dep repo and make a branch to work on.
**Things for us are
Respounder detects presence of responder in the network.
-
Updated
Jun 15, 2019 - Go
Improve this page
Add a description, image, and links to the network-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the network-security topic, visit your repo's landing page and select "manage topics."



Hi & welcome to Scapy's github ! This page lists issues that you can try to fix if you want to start contributing to Scapy.
This list includes wishes and things added by the maintainers based on the issues that we get, but also issues marked with
TODOorXXXthat already exist in Scapy's code base (layers). If you want to contribute to the project you might just take care one of the bugs.