killerbee

Network auditor

A toolkit for testing and auditing ZigBee and IEEE 802.15.4 networks

IEEE 802.15.4/ZigBee Security Research Toolkit

GitHub

767 stars
47 watching
216 forks
Language: C
last commit: over 1 year ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
dreadl0ck/netcap A framework for converting network packets into structured audit records for analysis and security monitoring 1,739
akestoridis/zigator Analyzes and manipulates data from Zigbee and Thread networks to identify security vulnerabilities and simulate attacks. 29
kevin-robertson/inveighzero A .NET tool designed to intercept and manipulate network communications in both IPv4 and IPv6 environments. 790
jusafing/pnaf Analyzes network traffic to provide security assessments and recommendations for network platforms 32
bishopfox/zigdiggity A toolkit for testing and exploiting ZigBee networks to identify vulnerabilities in IoT devices 265
larrytheslap/dumpy A Kubernetes plugin that captures network traffic from various resources using tcpdump 64
nccgroup/scoutsuite Automates security assessment of cloud environments to identify potential vulnerabilities and risks 6,794
ben0xa/honeycreds Detects network credential injection attempts by simulating legitimate credentials 215
triaquae/crazyeye Automates IT auditing and monitoring by recording user actions on connected servers 578
nwfsc-cb/rcax An R client to access Coordinated Assessments API data 5
postfinance/kubenurse A Kubernetes network monitoring tool that measures request durations, records errors, and exports metrics in Prometheus format. 419
ackeecz/reqres A logging library that records all network activity in iOS apps using different methods and protocols. 90
philippnormann/zigbear A toolkit for researching and testing the security of Zigbee devices. 27
mrskwiggs/netswift A high-level networking solution for Swift apps that provides type-safe network calls 25
codeexpress/respounder A tool that detects compromised machines by exploiting the lack of LLMNR name resolution in non-adversarial networks. 316