Payam T Chychi's repositories
ddos_dissector
Software responsible for extracting DDoS characteristics.
gatekeeper
First open-source DDoS protection system
sig-security
😎CNCF Special Interest Group on Security -- secure access, policy control, privacy, auditing, explainability and more!
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
bgpmon
CSU's BGP Observatory code (bgpmon/pheme)
cg-dashboard
Unarchived due to stratos bug in user management: https://github.com/cloudfoundry/stratos/issues/4103
dstat
Versatile resource statistics tool
fastnetmon
FastNetMon - very fast DDoS sensor with sFlow/Netflow/IPFIX/SPAN support
fedramp
Open source tool for processing OSCAL based FedRAMP SSPs
gobgpdump
a bgpdump tool that can filter, summarize and work across archives based on protoparse
goflow-1
Golang netflow parsing with flexible storage backend.
mbc-markdown
MBC content in markdown
netbox
IP address management (IPAM) and data center infrastructure management (DCIM) tool.
netperf
Netperf is a benchmark that can be used to measure the performance of many different types of networking. It provides tests for both unidirectional throughput, and end-to-end latency.
nikto
Nikto web server scanner
oh-my-zsh
🙃 A delightful community-driven (with 1,300+ contributors) framework for managing your zsh configuration. Includes 200+ optional plugins (rails, git, OSX, hub, capistrano, brew, ant, php, python, etc), over 140 themes to spice up your morning, and an auto-update tool so that makes it easy to keep up with the latest updates from the community.
pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
pytext
A natural language modeling framework based on PyTorch
roneo-netflow-duplicator
NetFlow Duplicator: ingest NetFlow and send it out to multiple collectors
samplicator
Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing
slides
Slide decks with editable source files
translate
Translate - a PyTorch Language Library
tutorials
Cloud security tutorials and best practices
udp-replicator
A tiny UDP proxy that can replicate traffic to one or more endpoints.
wg-identifying-security-threats
The purpose of the Identifying Security Threats working group is to enable stakeholders to have informed confidence in the security of open source projects. We do this by collecting, curating, and communicating relevant metrics and metadata from open source projects and the ecosystems of which they are a part.
XIA-for-Linux
XIA implementation for the Linux kernel