networksecurity

There are 99 repositories under networksecurity topic.

  • cisagov/Malcolm

    Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

    Language:Python2k55163331
  • Malcolm

    idaholab/Malcolm

    Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

    Language:Python3621954059
  • casterbyte/MITMonster

    A monster cheatsheet on MITM attacks

  • testmynids.org

    3CORESec/testmynids.org

    A website and framework for testing NIDS detection

    Language:Shell2256421
  • NetProbe

    HalilDeniz/NetProbe

    NetProbe: Network Probe

    Language:Python1493024
  • PacketSpy

    HalilDeniz/PacketSpy

    PacketSpy

    Language:Python1324025
  • Dosinator

    HalilDeniz/Dosinator

    DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.

    Language:Python1253216
  • alexjungaalto/FederatedLearning

    Material workbench for the master-level course CS-E4740 "Federated Learning"

    Language:Jupyter Notebook985535
  • HalilDeniz/NetworkAssessment

    NetworkAssessment: Network Compromise Assessment Tool

    Language:Python940017
  • cybergym

    lucideus-repo/cybergym

    Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.

    Language:Java745014
  • HKirito/GoogleAuth

    CobaltStrike and Google Auth twice

    Language:Java653012
  • txuswashere/pentesting

    CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...

  • kahramankostas/IoTGeM

    IoT Attack Detection with machine learning

    Language:Jupyter Notebook19204
  • karthikgenius/YaraCapper

    YARA rule-based automation system to detect network attacks at byte-level

    Language:Shell15203
  • leoisrael/Ghost_Dir

    Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.

    Language:JavaScript15331
  • 9QIX/Google-Cybersecurity-Certification-Notes

    This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.

  • WhiteHatCyberus/Deep-Learning-Evaluation-of-IDS-Datasets

    Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.

    Language:Jupyter Notebook13100
  • Dheeraj-02NK/Cryptography-and-Hashing

    Cryptography and Network Security form the backbone of secure communication in the digital realm. Cryptography involves the art and science of securing information through techniques such as encryption and decryption. Network Security, on the other hand, focuses on safeguarding data during its transmission across computer networks.

    Language:Jupyter Notebook1220
  • Malcolm

    mmguero-dev/Malcolm

    Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

    Language:Python11200
  • achoudh5/Manipulating_Excel_Sheet

    Real world application of Manipulating Excel Sheet using python.

    Language:Python831814
  • ShubhamJagtap2000/Computer-Networking

    Computer Networking knowledge every ethical hacking and cybersecurity enthusiast should know

  • imsiddhant/Palo-Alto-Networks-Cybersecurity-Specialization

    This repository shows all the hands on experience on Palo Alto Firewall, assignment and projects I have done in My Palo Alto Specialization Journey.

  • ThreatActorProcedures-MITRE-ATTACK

    jacobstickney/ThreatActorProcedures-MITRE-ATTACK

    A collection of specific commands used by threat actors, detailing their procedural implementations of tactics and techniques from the MITRE ATT&CK framework.

  • misterkrittin/CCNA-Labs

    CCNA-Labs From Zero 🔥🔥

  • mpawl/paydirt

    Pay Dirt

    Language:Python6100
  • aktechnohacker/Windows-wifi-password-stealer

    Get All Registered Wifi Passwords from Target Computer.

    Language:Python5103
  • martinmathurine/Windows-Event-Log-Analyser

    This is a PySimpleGUI-based Python software tool for processing and visualising selected Windows Event Security.evtx log files that meet a condition in Event ID 4688.

    Language:Python4120
  • Networks-and-Network-Security

    sondosaabed/Networks-and-Network-Security

    By the end of this course, I developed a greater understanding of network architecture, operations, intrusion tactics, common types of network vulnerabilities and attacks, and how to secure networks. I also was introduced to common network protocols, firewalls, virtual private networks (VPNs), and system hardening practices.

    Language:Jupyter Notebook410
  • PingSweeper

    christiangoeschel/PingSweeper

    PingSweeperâ„¢ is a Network Discovery and Information Gathering tool. The software uses multiple scanning techniques and summarizes all the findings in a structured manner and makes the network analysis process more efficient.

    Language:Shell3110
  • rickxy/Networking-Bank-System

    This network design is only meant for a small scale organisation (Micky Bank) where the access point could support approximately 200 users. The extra or unused port either on layer 2 or 3 switch could be reserved for further use especially when there is a need of expanding the network usage.

  • CSPF-Founder/shieldsup

    Shieldsup Scanner is a robust vulnerability scanner with an integrated bug tracker. It simplifies the tracking and fixing of vulnerabilities across your systems. By combining naabu port scanning and nuclei vulnerability scanning, Shieldsup Scanner identifies more vulnerabilities and covers a broader range of targets than nuclei alone.

    Language:Go2101
  • MrTechyWorker/NetHitX

    NetHitX is an ethical hacking tool crafted for educational purposes, empowering users to perform responsible security assessments and tests on WiFi networks WITHOUT ANY ADDITIONAL HARDWARE. Always ensure explicit permission to use this script on target networks and adhere to all applicable laws and ethical guidelines.

    Language:Python2100
  • usmanbatch8/usman

    Devops Batch08

    Language:Shell2100