Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Dosinator | 87 | 5 months ago | mit | Python | ||||||
DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python. | ||||||||||
Wireshark Cheatsheet | 82 | 4 years ago | mit | |||||||
Wireshark Cheat Sheet | ||||||||||
Trafficwatch | 74 | 4 months ago | 1 | mit | Python | |||||
TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files | ||||||||||
Ics Hacking | 39 | 2 years ago | 2 | gpl-3.0 | C | |||||
This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested | ||||||||||
Packetspy | 25 | 3 months ago | mit | Python | ||||||
PacketSpy | ||||||||||
Snort Gui | 11 | 8 months ago | mit | Python | ||||||
SNORT GUI: Your very own trusted blueteam forensic companion for SNORT IDS. OPTIMIZED, SECURE AND ABSOLUTELY FREE! | ||||||||||
Intro To Ethical Hacking | 5 | 4 years ago | JavaScript | |||||||
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action. |