The IPv6Tools framework is a robust set of modules and plugins that allow a user to audit an IPv6 enabled network. The built-in modules support enumeration of IPv6 features such as ICMPv6 and Multicast Listener Discovery (MLD). In addition, the framework also supports enumeration of Upper Layer Protocols (ULP) such as multicast DNS (mDNS) and Link-Local Multicast Name Resolution (LLMNR). Users can easily expand the capability of the framework by creating plugins and modules in the Python language. Requirements python 2.7 pip npm [development only] Installation Standard _ [Optional] Use a virtualenv for installation: _ virtualenv venv && source venv/bin/activate git clone http://github.com/apg-intel/ipv6tools.git sudo pip install -r requirements.txt Development git clone http://github.com/apg-intel/ipv6tools.git git checkout dev npm run setup Usage Standard sudo python app.py Navigate to http://localhost:8080 in a web browser Development Run $ npm run serve In a separate terminal, run npm run dev Navigate to http://localhost:8081 in a web browser CLI TODO Modules Modules are classes that allow interaction with individual nodes or all nodes. These show up as a right click option on each node, or as a button below the graph. Included Modules Included in the project are a couple of modules to help validate your network, as well as use as examples for your own modules. poisonLLMNR – Link-Local…
govanguard https://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2020-02-10 15:30:002020-02-10 15:30:00IPv6Tools - A Robust Modular Framework That Enables The Ability To Visually Audit An IPv6 Enabled Network
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com