Scapy: the Python-based interactive packet manipulation program & library.
-
Updated
Mar 17, 2026 - Python
Scapy: the Python-based interactive packet manipulation program & library.
Centralized network visibility and continuous asset discovery. Monitor devices, detect change, and stay aware across distributed networks.
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, etc.
Yi Kuan Gua Yong Yu Yi HWXing Dong /Hong Dui /Shen Tou Ce Shi Tuan Dui Wei Chang Jing De Yi Dong Duan (Android, iOS, WEB, H5, Jing Tai Wang Zhan )Xin Xi Shou Ji Sao Miao Gong Ju ,Ke Yi Bang Zhu Shen Tou Ce Shi Gong Cheng Shi , Gong Ji Dui Cheng Yuan , Hong Dui Cheng Yuan Kuai Su Shou Ji Dao Yi Dong Duan Huo Zhe Jing Tai WEBZhan Dian Zhong Guan Jian De Zi Chan Xin Xi Bing Ti Gong Ji Ben De Xin Xi Shu Chu ,Ru :Title, Domain, CDN, Zhi Wen Xin Xi , Zhuang Tai Xin Xi Deng .
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
A high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls.
Subdomain enumeration tool
NFStream: a Flexible Network Data Analysis Framework.
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Unofficial DedSec Project GitHub Repository
Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors in the network traffic. Stratosphere Laboratory, AIC, FEL, CVUT in Prague.
Network Security Sniffer
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
Scirius is a web application for Suricata ruleset management and threat hunting.
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
CyberScan: Network's Forensics ToolKit
Add a description, image, and links to the network-security topic page so that developers can more easily learn about it.
To associate your repository with the network-security topic, visit your repo's landing page and select "manage topics."