You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This script is designed to analyze network traffic captured in a .pcap file using the pyshark library. // Este script está diseñado para analizar el tráfico de red capturado en un archivo .pcap utilizando la librería pyshark.
Fortress Linux is an automated Linux hardening solution designed to improve your system's security posture. It integrates Ansible for streamlined deployment across multiple systems and Wazuh for continuous monitoring and alerting of security threats.
a network traffic anomaly detector that captures and analyzes network packets to identify anomalous behavior. It uses machine learning techniques to detect deviations from normal traffic patterns // un detector de anomalías en el tráfico de red que captura y analiza paquetes de red para identificar comportamientos anómalos.
Minimalist yet powerful Docker security scanner implemented in Go, designed to help users identify common security issues in their running containers. The scanner checks for containers running as the root user, exposed ports, and provides a simplified check for missing security updates.
A command-line tool written in Python that helps you identify potential security vulnerabilities and cost optimization opportunities in your Terraform infrastructure code.
Tool designed to scan authentication protocols in networks, identifying possible vulnerabilities in the systems. Using the powerful capabilities of the Hydra tool, it allows authentication tests to be performed on various services, while Netcat (nc) is used to obtain additional information and evaluate the network environment.
Network scanning tool designed to identify IoT devices and detect vulnerabilities in them. This tool uses Nmap to scan the network and detect devices, and then runs NSE (Nmap Scripting Engine) scripts to identify known vulnerabilities.