networksecurity
There are 99 repositories under networksecurity topic.
cisagov/Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
idaholab/Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
casterbyte/MITMonster
A monster cheatsheet on MITM attacks
3CORESec/testmynids.org
A website and framework for testing NIDS detection
HalilDeniz/NetProbe
NetProbe: Network Probe
HalilDeniz/PacketSpy
PacketSpy
HalilDeniz/Dosinator
DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.
alexjungaalto/FederatedLearning
Material workbench for the master-level course CS-E4740 "Federated Learning"
HalilDeniz/NetworkAssessment
NetworkAssessment: Network Compromise Assessment Tool
lucideus-repo/cybergym
Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.
HKirito/GoogleAuth
CobaltStrike and Google Auth twice
txuswashere/pentesting
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
kahramankostas/IoTGeM
IoT Attack Detection with machine learning
karthikgenius/YaraCapper
YARA rule-based automation system to detect network attacks at byte-level
leoisrael/Ghost_Dir
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
9QIX/Google-Cybersecurity-Certification-Notes
This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.
WhiteHatCyberus/Deep-Learning-Evaluation-of-IDS-Datasets
Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.
Dheeraj-02NK/Cryptography-and-Hashing
Cryptography and Network Security form the backbone of secure communication in the digital realm. Cryptography involves the art and science of securing information through techniques such as encryption and decryption. Network Security, on the other hand, focuses on safeguarding data during its transmission across computer networks.
mmguero-dev/Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
achoudh5/Manipulating_Excel_Sheet
Real world application of Manipulating Excel Sheet using python.
HalilDeniz/HalilDeniz
HalilDeniz
ShubhamJagtap2000/Computer-Networking
Computer Networking knowledge every ethical hacking and cybersecurity enthusiast should know
imsiddhant/Palo-Alto-Networks-Cybersecurity-Specialization
This repository shows all the hands on experience on Palo Alto Firewall, assignment and projects I have done in My Palo Alto Specialization Journey.
jacobstickney/ThreatActorProcedures-MITRE-ATTACK
A collection of specific commands used by threat actors, detailing their procedural implementations of tactics and techniques from the MITRE ATT&CK framework.
misterkrittin/CCNA-Labs
CCNA-Labs From Zero 🔥🔥
mpawl/paydirt
Pay Dirt
aktechnohacker/Windows-wifi-password-stealer
Get All Registered Wifi Passwords from Target Computer.
martinmathurine/Windows-Event-Log-Analyser
This is a PySimpleGUI-based Python software tool for processing and visualising selected Windows Event Security.evtx log files that meet a condition in Event ID 4688.
sondosaabed/Networks-and-Network-Security
By the end of this course, I developed a greater understanding of network architecture, operations, intrusion tactics, common types of network vulnerabilities and attacks, and how to secure networks. I also was introduced to common network protocols, firewalls, virtual private networks (VPNs), and system hardening practices.
christiangoeschel/PingSweeper
PingSweeperâ„¢ is a Network Discovery and Information Gathering tool. The software uses multiple scanning techniques and summarizes all the findings in a structured manner and makes the network analysis process more efficient.
rickxy/Networking-Bank-System
This network design is only meant for a small scale organisation (Micky Bank) where the access point could support approximately 200 users. The extra or unused port either on layer 2 or 3 switch could be reserved for further use especially when there is a need of expanding the network usage.
CSPF-Founder/shieldsup
Shieldsup Scanner is a robust vulnerability scanner with an integrated bug tracker. It simplifies the tracking and fixing of vulnerabilities across your systems. By combining naabu port scanning and nuclei vulnerability scanning, Shieldsup Scanner identifies more vulnerabilities and covers a broader range of targets than nuclei alone.
MrTechyWorker/NetHitX
NetHitX is an ethical hacking tool crafted for educational purposes, empowering users to perform responsible security assessments and tests on WiFi networks WITHOUT ANY ADDITIONAL HARDWARE. Always ensure explicit permission to use this script on target networks and adhere to all applicable laws and ethical guidelines.
usmanbatch8/usman
Devops Batch08