Nipper-ng is the next generation of nippper, and will always remain free and open source. This software will be used to make observations about the security configurations of many different device types such as routers, firewalls, and switches of a network infrastructure. This is a fork from nipper 0.11.10 release of the GNUv3 GPL code. I don't know how bad it is, however it's a starting place to work from. The goal being able to output something that could be used for reporting device configuration weaknesses. If you would like to help, please let me know. I would like to potentially rewrite this using another language to allow for platform portability, something like python or a byte complied language. Thanks!
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A simple IOC scanner bash script for Linux/Unix/OSX systems
A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.
A repository of pre-defined detections for security threats and abnormal behaviors in Falco.
A fast and flexible HTTP enumerator for content discovery and credential bruteforcing
Simple perl script for making Modbus transactions from the command line.
Intercepts and examines mobile app connections by stripping SSL/TLS layer.