150 results for “topic:networksecurity”
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
MITM Field Manual
A website and framework for testing NIDS detection
Material workbench for the master-level course CS-E4740 "Federated Learning"
NetProbe: Network Probe
PacketSpy
DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.
Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.
Project Eyes On is a high-speed, multi-threaded surveillance tool by Y0oshi (@rde0) for locating open IP cameras worldwide. Unifies Google Dorking and Directory Scraping into a single OSINT engine.
Some Conferences' accepted paper lists (including Network, Security, AI) 顶会近五年论文列表
This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.
CobaltStrike and Google Auth twice
IoT Attack Detection with machine learning
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
CCNA-Labs From Zero 🔥🔥
Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
YARA rule-based automation system to detect network attacks at byte-level
Cryptography and Network Security form the backbone of secure communication in the digital realm. Cryptography involves the art and science of securing information through techniques such as encryption and decryption. Network Security, on the other hand, focuses on safeguarding data during its transmission across computer networks.
No description provided.
Pi-hole v6.1.4 introduces significant improvements over previous versions, enhancing performance, domain filtering, and API integration for better management.
A collection of specific commands used by threat actors, detailing their procedural implementations of tactics and techniques from the MITRE ATT&CK framework.
Real world application of Manipulating Excel Sheet using python.
This repository, EthicalHackingTools, is a curated collection of scripts and tools designed for security researchers and penetration testers. It serves as a central hub for various utilities used in ethical hacking, ranging from reconnaissance to vulnerability assessment.
Free Wireshark tutorials for beginners with 13 interactive lessons. Easy-to-follow programming guides with hands-on practice exercises.
HalilDeniz
Computer Networking knowledge every ethical hacking and cybersecurity enthusiast should know
Pay Dirt
This repository shows all the hands on experience on Palo Alto Firewall, assignment and projects I have done in My Palo Alto Specialization Journey.
A comprehensive security tool for detecting malicious domains that bypass DNS security controls. DNS Gap Hunter evaluates the effectiveness of DNS Firewalls and sinkhole mechanisms by testing them against domains from multiple threat intelligence sources, identifying security gaps, and providing detailed reports.