#安卓#A cross-platform programmable network tool
翻译 - Brook是跨平台的强加密功能,无法检测到代理。零配置。
In-depth attack surface mapping and asset discovery
翻译 - 深度攻击面映射和资产发现
Scapy 是一个基于Python的交互式网络数据包操作工具。可用于伪造、解码、嗅探网络数据包。
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
翻译 - 🍯T-Pot-多合一蜜罐平台🐝
Enterprise-ready zero-trust access platform built on WireGuard®.
Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history
3proxy - tiny free proxy server
翻译 - 3proxy-微型免费代理服务器
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
翻译 - 自动化渗透测试框架
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, colle...
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, a...
翻译 - Security Onion 2 - 用于威胁搜寻、企业安全监控和日志管理的 Linux 发行版
Best practices for segmentation of the corporate network of any company
翻译 - 分割任何公司的企业网络的最佳实践
#安卓#一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Smap 是一个由shodan.io驱动的端口扫描器,是Nmap的替代品
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues invo...
翻译 - 贾斯汀·塞茨(Justin Seitz)的《黑帽Python》一书的源代码。该代码已完全转换为Python 3,经过重新格式化以符合PEP8标准,并进行了重构以消除涉及不赞成使用的库的实现的依赖关系问题。
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.