Softwarez.Info - Software's World!
25 most popular Python scripts for network security - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: E-Books (https://softwarez.info/Forum-E-Books)
+--- Thread: 25 most popular Python scripts for network security (/Thread-25-most-popular-Python-scripts-for-network-security)



25 most popular Python scripts for network security - BaDshaH - 05-15-2024

[Image: b155b80ab758692073cdc4ecaef851d9.jpg]
25 most popular Python scripts for network security

English | February 27, 2024 | ISBN: N/A | ASIN: B0CW1DWS1T | 100 pages | True EPUB | 1.03 Mb

Below - table of contents. Each chapter has a listing of a ready-to-use program with explanations
API Security Tester: Test APIs for common security vulnerabilities like SQL injection, XSS, and misconfigurations.
Automated Phishing Detector: Analyze emails or web content for phishing indicators.
Botnet Detection System: Monitor network traffic to identify patterns indicative of botnet activity.
Credential Leak Monitor: Monitor public leaks and breaches for compromised credentials of your domain or organization.
DDoS Simulation Tool: Simulate DDoS attacks to test the resilience and response capabilities of networks or applications.
DNS Query Tool: Perform DNS lookups to gather information about domains.
Encryption/Decryption Tool: Encrypt or decrypt files using various algorithms for secure communication or storage.
File Integrity Checker: Monitor files and directories for unexpected changes that might indicate tampering.
Firewall Configuration Checker: Analyze firewall rules to ensure they meet security policies.
Forensic Image Analyzer: Analyze disk images for evidence and artifacts useful in digital forensics investigations.
Forensic image analyzer - expanded: enhancements can include support for more file system types, extraction and analysis of deleted files, file signature analysis, integration with databases of known hashes for identifying suspicious or known files, and handling encrypted disk images
Incident Response Toolkit: Aggregate tools for quick response to security incidents, such as isolating affected systems or collecting evidence.
Log Analyzer: Parse and analyze system or application logs for suspicious activities.
Malware Analysis Helper: Automate basic static and dynamic analysis tasks on suspected malware files.
Network Scanner: Scan a network for active devices using ICMP packets or specific ports.
Packet Sniffer: Capture and analyze network packets to monitor network traffic and detect anomalies.
Password Strength Tester: Check the complexity of passwords against common password policies.
Port Scanner: Scan a target IP address or hostname to identify open ports and infer running services.
Security Policy Compliance Checker: Verify that systems comply with security policies, standards, or benchmarks.
SSH Brute Force Attack: Attempt to gain SSH access by trying a list of usernames and passwords against a target server.
SSL/TLS Scanner: Scan websites to evaluate the security of their SSL/TLS configurations.
Subdomain Finder: Enumerate subdomains of a given domain to uncover potential attack vectors.
Vulnerability Scanner: Scan systems or applications for known vulnerabilities using databases like CVE.
Web Scraper for Security Feeds: Scrape security websites or RSS feeds for the latest vulnerabilities and threats.
Wireless Network Scanner: Identify Wi-Fi networks and devices, assessing them for vulnerabilities.

[To see links please register or login]