Awesome Open Source
Search results for network security
358 search results found
Setup Ipsec Vpn
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
eBPF-based Networking, Security, and Observability
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
A scalable overlay networking tool with a focus on performance, simplicity and security
The Rogue Access Point Framework
Application to comfortably monitor your Internet traffic 🕵️♂️
Test Your Sysadmin Skills
A collection of Linux Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.
Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
The pattern matching swiss knife
Docker Ipsec Vpn Server
Docker image to run an IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
WireGuard®-based VPN server and firewall
Kubernetes Network Policy Recipes
Example recipes for Kubernetes Network Policies that you can just copy paste
Distributed private networking
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, etc.
An on-path blackbox network traffic security testing tool
To fix the Docker and UFW security flaw without disabling iptables
Penetration Testing Tools
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
The future of online communications.
XRay is a tool for recon, mapping and OSINT gathering from public networks.
A p2p, secure file storage, social network and application protocol
Core basic components: log (file / network), configuration (XML / JSON / HTTP), cache (memory / redis), network (TCP / UDP / HTTP), RPC framework, serialization (binary / XML / JSON), APM performance tracking. 核心基础组件，日志（文件/网络）、配置（XML/Json/Http）、缓存（内存/Redis）、网络
A framework for secure and scalable network traffic analysis - https://netcap.io
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
100 Redteam Projects
Projects for security students
❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
🖖 Fast, modern, easy-to-use network scanner
Network Defense System.
WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
A Suricata based IDS/IPS/NSM distro
Graph Fraud Detection Papers
A curated list of fraud detection papers using graph information or graph neural networks
Geo-scale, next-generation peer-to-peer sharing platform built on top of OpenZiti.
SSH-based "VPN for poors"
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
A utility to safely generate malicious network traffic patterns and evaluate controls.
☁️ Securely connect anything with WireGuard® and manage all your networks from a single place.
An information security preparedness tool to do adversarial simulation.
Awesome Cybersecurity Datasets
A curated list of amazingly awesome Cybersecurity datasets
Azure Network Security
Resources for improving Customer Experience with Azure Network Security
Threshold Access Control (TACo) runtimes for the Threshold Network
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
This is meant to assist people looking for entry level Cybersecurity jobs, as well as study up on skills that they can put on their resume.
Awesome Zero Trust
A curated collection of awesome resources for the zero-trust security model.
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Blind WAF identification tool
Java library for secure, distributed, P2P-based file synchronization and sharing.
The most exhaustive list of reliable DNS resolvers.
WireGuard VPN server installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS, Fedora, openSUSE and Raspberry Pi OS
OpenVPN server installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS, Fedora, openSUSE, Amazon Linux 2 and Raspberry Pi OS
🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Repository to store what we have studied. 📖 We want everyone to get a job through TechnicalNote.
NetCat for Windows
QNSM is network security monitoring framework based on DPDK.
A firewall that utilizes the Linux kernel's XDP hook. The XDP hook allows for very fast network processing on Linux systems. This is great for dropping malicious traffic from a (D)DoS attack. IPv6 is supported with this firewall! I hope this helps existing network engineers/programmers interested in utilizing XDP or anybody interested in getting into those fields! (D)DoS mitigation/prevention is such an important part of Cyber Security and understanding the concept of networking and packet flow
Wifi Penetration Testing Cheat Sheet
Work in progress...
Forward local or remote tcp ports through SMB pipes.
Great List of Resources to Build an Enterprise Grade Home Lab
Call For Wpa3
Call for WPA3 - what's wrong with WPA2 security and how to fix it
Ansible modules for Palo Alto Networks NGFWs
The modular distributed fingerprinting engine
A Vuejs 2 adapter for Visjs
📦 The fastest and simplest packet manipulation lib for Python
🚂 The little forwarder that could
Attacks On Tor
Thirteen Years of Tor Attacks
Official repository of OnionCat, the VPN adapter for Tor and I2P.
Python-based Comprehensive Network Packet Analysis Library
A graphical security analysis tool for IoT networks
A simple tool for offline searching of default credentials for network devices, web applications and more.
Framework for Man-In-The-Middle attacks
내가 일주일간 공부하거나 알게된 내용을 공유하는 공간 📱
An Open-Source Collection of 230+ Flash Cards to Help You Succeed in Your System Design Interview and More 💯
DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat detection
DroidSniff is an Android app for Security analysis in wireless networks and capturing facebook, twitter, linkedin and other accounts.
A lightweight tool to score network traffic and flag anomalies
IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.
Simple Wireguard 2FA
DNSWatch - DNS Traffic Sniffer and Analyzer
Awesome Ddos Tools
Collection of several DDos tools.
Awesome Penetration Testing A collection of awesome penetration testing resources
Analysis Suite For EAP Enabled Wireless Networks
LZR quickly detects and fingerprints unexpected services running on unexpected ports.
DNS-Discovery is a multithreaded subdomain bruteforcer.
Steampipe Mod Aws Perimeter
Is your AWS perimeter secure? Use Steampipe to check your AWS accounts for public resources, resources shared with untrusted accounts, insecure network configurations and more.
KNXnet/IP scanning and auditing tool for KNX home automation installations.
Private Tor Network
Run an isolated instance of a tor network in Docker containers
Open source all-in-one CLI tool to semi-automate pentesting.
A repository for ebooks， including C, C plus plus, Linux Kernel, Compiler, OS, Algorithm, Security, Database, Network, ML and DL
Mastering Python For Networking And Security Second Edition
Mastering Python for Networking and Security, Second Edition, published by Packt
Palo Alto Networks App for Splunk leverages the data visibility provided by Palo Alto Networks next-generation firewalls and endpoint security with Splunk's extensive investigation and visualization capabilities to deliver an advanced security reporting and analysis tool.
Gke Network Policy Demo
This guide demonstrates how to improve the security of your Kubernetes Engine by applying fine-grained restrictions to network communication. You will provision a simple HTTP server and two client pods in a Kubernetes Engine cluster, then use a Network Policy restrict connections from client pods.
VPN kill switch for macOS
Collection of ssl verification functions for Erlang
Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities
Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
A minimal DNS service that can provide spoofed replies
Security Vulnerability (12,341)
Laravel Security (11,580)
Python Network (11,547)
Php Security (10,611)
Python Security (3,710)
Jupyter Notebook Network (3,562)
Deep Network (2,403)
Html Security (2,245)
1-100 of 358 search results
Follow Us On Twitter
Copyright 2018-2023 Awesome Open Source. All rights reserved.