Selected source code can be found publicly at https://github.com/H21lab.
By accessing this website, applications, or any content, you agree to be bound by our Terms & Policies.
The following tools are available:
Anomaly Detection - Python scripts which can help to analyze anomalies in PCAP files. It uses unsupervised learning with autoencoder neural networks and TensorFlow classifier to detect anomalous network traffic patterns.
Desktop Security - Security recommendations regarding desktops, including hardening guidelines for local firewalls, outgoing traffic filtering, and mitigating malware back-connections to C&C servers on both Linux and Windows environments.
Json to Pcap / Anonymization - Script which can be used to reconstruct PCAP and perform packet modifications from tshark JSON output. Script is also allowing to perform PCAP anonymization and is included in the official Wireshark repository.
jDiameter - Examples and build instructions for using the RestComm jDiameter library - a Java implementation of the Diameter protocol for Authentication, Authorization, and Accounting (AAA) in telecom networks.
jSS7 - Build instructions and examples of SS7 (Sigtran) client which could be used for testing, based on the RestComm jSS7 library for mobile network signalling.
Pentest Cheat Sheet - A collection of penetration testing resources and references to help security auditors conduct network and system security assessments.
tshark + Elasticsearch - Uses tshark to capture packets from a network interface or from PCAP files and index them in Elasticsearch for network traffic monitoring, analysis, and visualization with Kibana.