Repository navigation

#

networksecurity

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

Python
2197
13 天前

A website and framework for testing NIDS detection

Shell
278
1 个月前

Material workbench for the master-level course CS-E4740 "Federated Learning"

Jupyter Notebook
142
1 个月前

DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.

Python
138
1 年前

Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.

Java
85
4 年前
Java
64
4 年前

This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.

44
1 年前

CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...

27
2 年前

Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.

JavaScript
15
2 年前

YARA rule-based automation system to detect network attacks at byte-level

Shell
15
4 年前

Cryptography and Network Security form the backbone of secure communication in the digital realm. Cryptography involves the art and science of securing information through techniques such as encryption and decryption. Network Security, on the other hand, focuses on safeguarding data during its transmission across computer networks.

Jupyter Notebook
12
2 年前

A collection of specific commands used by threat actors, detailing their procedural implementations of tactics and techniques from the MITRE ATT&CK framework.

8
7 个月前