 IPv6-Attack-Detector
 IPv6-Attack-Detector 
 IPv6 attack detector
 Tools to detect and analyze link-local IPv6 attacks
Google Summer of Code 2012 project, supported by The Honeynet Project organization.
39 stars
 9 watching
 12 forks
 
Language: Python 
last commit: about 5 years ago 
Linked from   1 awesome list  
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | Detecting backdoors in language models to prevent malicious AI usage | 109 | 
|  | Exploits default Windows configuration to take control of DNS and redirect traffic to an attacker's machine. | 1,728 | 
|  | Detects and analyzes Botnet connections to identify malware patterns and networks | 304 | 
|  | Records disclosed OSS-Fuzz vulnerabilities and their impact on versions and commits | 138 | 
|  | An open-source project that explores the intersection of machine learning and security to develop tools for detecting vulnerabilities in web applications. | 1,987 | 
|  | An automated tool to identify potential smart contract vulnerabilities on the Ethereum blockchain | 160 | 
|  | Automates OSINT analysis of IP addresses and hashes by querying multiple data sources | 535 | 
|  | Automates scanning of HTTP resources in a target network using XML External Entity (XXE) attacks | 37 | 
|  | A honeypot system designed to detect and identify attackers exploiting a specific Elasticsearch vulnerability | 23 | 
|  | An IDA PRO plugin to analyze binaries for potential vulnerabilities using AI-powered decompilation and static analysis | 353 | 
|  | A Python interface to YOLO object detection software using Darknet | 27 | 
|  | A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. | 2,016 | 
|  | Tools to generate and detect unicode domains for phishing attacks using python | 1,147 | 
|  | A lightweight tool for detecting exploits and generating policies based on micro behaviors of malicious activities | 142 | 
|  | A PHP SDK for detecting and mitigating malicious traffic by identifying suspicious IP addresses and URLs. | 3 |