76 Open Source Network Security Software Projects
Free and open source network security code projects including engines, APIs, generators, and tools.
Scapy 5671 ⭐
Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Blackhat Python3 903 ⭐
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Bypass Firewalls By Dns History 670 ⭐
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Jackhammer 618 ⭐
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Batfish 542 ⭐
Batfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
0xsauby Yasuo 503 ⭐
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Eonraider Violent Python3 511 ⭐
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Flipkart Incubator Watchdog 324 ⭐
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Zxrequestblock 141 ⭐
Netsec Ps Scripts 126 ⭐
Collection of PowerShell network security scripts for system administrators.
Gonids 93 ⭐
gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Conet 72 ⭐
What is possible, not what is What it could be, not what it is A more secure way of doing… everything
Metateta 68 ⭐
Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit
Train Ai With Django Swagger Jwt 60 ⭐
Train AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Domainclassifier 57 ⭐
DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text files following their DNS existence, localization or attributes.
Crviz 49 ⭐
Browser-based visualization tool that uses JSON and an interactive enclosure diagram to visualize networks.
Brutal_ssh 45 ⭐
Brutal SSH: SSH Login brute force, scan for vulnerable version and 0 day exploit (under development)
Realip 35 ⭐
The Spigot, Bungee and Velocity plugin that parses client IP addresses passed from the TCPShield network.
Bgp Ranking 31 ⭐
BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)
Network Pipeline 25 ⭐
Network traffic data pipeline for real-time predictions and building datasets for deep neural networks
Jxnet 22 ⭐
Jxnet is a Java library for capturing and sending custom network packet buffers with no copies. Jxnet wraps a native packet capture library (libpcap/winpcap/npcap) via JNI (Java Native Interface).
Holisticinfosec For Webdevelopers Fascicle1 18 ⭐
:books: VPS :lock: Network :lock: Cloud :lock: Web Applications :books:
Federated Ml 22 ⭐
Detect anomalies in network traffic data using Federated Machine Learning technique.
Community Id Spec 94 ⭐
An open standard for hashing network flows into identifiers, a.k.a "community IDs".
Null 11 ⭐
These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.
Null 11 ⭐
A Zeek Network Security Monitor Tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.