mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-12-12 09:34:26 -05:00
Add: secureworks/dalton to Network Security section
This commit is contained in:
parent
c64d3ace79
commit
2ac2728745
14
README.md
14
README.md
@ -2158,6 +2158,10 @@ This repository is created as an online bookmark for useful links, resources and
|
||||
<td><a href="https://github.com/fireeye/flare-fakenet-ng">fireeye/flare-fakenet-ng</a></td>
|
||||
<td>FakeNet-NG - Next Generation Dynamic Network Analysis Tool</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/qeeqbox/chameleon">qeeqbox/chameleon</a></td>
|
||||
<td>Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres and MySQL)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/infobyte/evilgrade">infobyte/evilgrade</a></td>
|
||||
<td>Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. It comes with pre-made binaries (agents), a working default configuration for fast pentests, and has it's own WebServer and DNSServer modules. Easy to set up new settings, and has an autoconfiguration when new binary agents are set.</td>
|
||||
@ -2194,15 +2198,15 @@ This repository is created as an online bookmark for useful links, resources and
|
||||
<td><a href="https://www.netresec.com/?page=PolarProxy">PolarProxy</a></td>
|
||||
<td>PolarProxy is a transparent SSL/TLS proxy created for incident responders and malware researchers. PolarProxy is primarily designed to intercept and decrypt TLS encrypted traffic from malware. PolarProxy decrypts and re-encrypts TLS traffic, while also saving the decrypted traffic in a PCAP file that can be loaded into Wireshark or an intrusion detection system (IDS).</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/secureworks/dalton">secureworks/dalton</a></td>
|
||||
<td>Suricata and Snort IDS rule and pcap testing system</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/sensepost/routopsy">sensepost/routopsy</a></td>
|
||||
<td>Routopsy is a toolkit built to attack often overlooked networking protocols. Routopsy currently supports attacks against Dynamic Routing Protocols (DRP) and First-Hop Redundancy Protocols (FHRP).</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/qeeqbox/chameleon">qeeqbox/chameleon</a></td>
|
||||
<td>Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres and MySQL)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/USArmyResearchLab/Dshell">USArmyResearchLab/Dshell</a></td>
|
||||
<td>An extensible network forensic analysis framework. Enables rapid development of plugins to support the dissection of network packet captures.</td>
|
||||
</tr>
|
||||
|
Loading…
Reference in New Issue
Block a user