Update render script and Makefile

This commit is contained in:
Jonas Zeunert
2024-04-22 21:54:39 +02:00
parent 2d63fe63cd
commit 4d0cd768f7
10975 changed files with 47095 additions and 4031084 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Scapy !Awesome (https://awesome.re/badge.svg) (https://awesome.re)
 Awesome Scapy !Awesome (https://awesome.re/badge.svg) (https://awesome.re)
 
@@ -33,21 +33,21 @@
Measurements
- mtraceroute (https://github.com/rwhalb/mtraceroute) - Create cool graphs over multiple traceroute analysis.
- Network Security Toolkit (NST) (https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Use_The_Scapy:_Multi-Traceroute_-_MTR) - Includes an enhanced version of mtraceroute with IP Geolocation 
and GUI management.
- Network Security Toolkit (NST) (https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Use_The_Scapy:_Multi-Traceroute_-_MTR) - Includes an enhanced version of mtraceroute 
with IP Geolocation and GUI management.
- netprobify (https://github.com/criteo/netprobify) - Network probing tool crafted for datacenters (but not only). Probing using: TCP, UDP or ICMP.
Protocols
- Cotopaxi (https://github.com/Samsung/cotopaxi) - Set of tools for security testing of Internet of Things devices using specific network IoT protocols (AMQP, CoAP, DTLS, HTCPCP, KNX, mDNS, MQTT, MQTT-SN, QUIC, 
RTSP, SSDP) .
- Cotopaxi (https://github.com/Samsung/cotopaxi) - Set of tools for security testing of Internet of Things devices using specific network IoT protocols (AMQP, CoAP, DTLS, HTCPCP, KNX, mDNS, 
MQTT, MQTT-SN, QUIC, RTSP, SSDP) .
- project-memoria-detector (https://github.com/Forescout/project-memoria-detector) - Determine whether a network device runs a specific embedded TCP/IP stack.
- routopsy (https://github.com/sensepost/routopsy) - Toolkit to attack DRP & FHRP.
- TorPylle (https://github.com/cea-sec/TorPylle) - Implementation of the OR (TOR) protocol.
Unit Tests
- Linux Kernel (https://github.com/torvalds/linux/blob/master/tools/testing/selftests/tc-testing/plugin-lib/scapyPlugin.py) - Linux Traffic Control (tc) testing suite.
- OpenBSD (https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dscapy%2Brepo%253Aopenbsd%252Fsrc%2Bpath%253Aregress%252F%26type%3DCode%26ref%3Dadvsearch%26l%3D%26l%3D) - IPv6 stack testing 
suite.
- OpenBSD (https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dscapy%2Brepo%253Aopenbsd%252Fsrc%2Bpath%253Aregress%252F%26type%3DCode%26ref%3Dadvsearch%26l%3D%26l%3D) -
IPv6 stack testing suite.
- RIOT-OS (https://github.com/RIOT-OS/RIOT/search?l=Python&q=scapy&type=Code) - RIOT OS networking testing suite.
Visualization
@@ -86,10 +86,10 @@
2020
- CVE-2020-25577 (https://blog.quarkslab.com/bad-neighbor-on-freebsd-ipv6-router-advertisement-vulnerabilities-in-rtsold-cve-2020-25577.html) - Bad Neighbor on FreeBSD: IPv6 Router Advertisement Vulnerabilities 
in rtsold.
- CVE-2020-16898 (https://blog.quarkslab.com/beware-the-bad-neighbor-analysis-and-poc-of-the-windows-ipv6-router-advertisement-vulnerability-cve-2020-16898.html) - Beware the Bad Neighbor: Analysis and PoC of 
the Windows IPv6 Router Advertisement Vulnerability.
- CVE-2020-25577 (https://blog.quarkslab.com/bad-neighbor-on-freebsd-ipv6-router-advertisement-vulnerabilities-in-rtsold-cve-2020-25577.html) - Bad Neighbor on FreeBSD: IPv6 Router 
Advertisement Vulnerabilities in rtsold.
- CVE-2020-16898 (https://blog.quarkslab.com/beware-the-bad-neighbor-analysis-and-poc-of-the-windows-ipv6-router-advertisement-vulnerability-cve-2020-16898.html) - Beware the Bad Neighbor: 
Analysis and PoC of the Windows IPv6 Router Advertisement Vulnerability.
2019
- CVE-2019-5597 (https://www.synacktiv.com/ressources/Synacktiv_OpenBSD_PacketFilter_CVE-2019-5597_ipv6_frag.pdf) - IPv6 fragmentation vulnerability in OpenBSD Packet Filter.
@@ -102,7 +102,8 @@
- krackattacks-scripts (https://github.com/vanhoefm/krackattacks-scripts) - Test if clients or access points (APs) are affected by the KRACK attack against WPA2.
2016
- CVE-2016-6366 (https://github.com/RiskSense-Ops/CVE-2016-6366) - The EXTRABACON exploit, a remote code execution for Cisco ASA written by the Equation Group (NSA) and leaked by the Shadow Brokers.
- CVE-2016-6366 (https://github.com/RiskSense-Ops/CVE-2016-6366) - The EXTRABACON exploit, a remote code execution for Cisco ASA written by the Equation Group (NSA) and leaked by the Shadow 
Brokers.
Misc
- isf (https://github.com/dark-lbp/isf) - ISF (Industrial Control System Exploitation Framework). A suite that provides exploits various industrial protocols.