An Interactive Pcap Editor (based on Scapy)
☆23Oct 11, 2020Updated 5 years ago
Alternatives and similar repositories for pcapedit
Users that are interested in pcapedit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Aug 11, 2020Updated 5 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Feb 28, 2020Updated 6 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- A wireless mesh based Command and Control infrastructure for locating mobile rogue access points☆16Jan 18, 2021Updated 5 years ago
- This repository stores information to access torproject services from cloud-fronted services☆10Jul 4, 2015Updated 10 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 7 years ago
- a federated social network☆15Apr 8, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- a bot for the ipfs irc channel that pins things (among other menial tasks)☆24May 2, 2018Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- WIP python3 plugin for x64dbg☆16Mar 31, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Ideas for a new implementation of cjdns☆21Feb 4, 2015Updated 11 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- CLI to test if your local dependencies are outdated. Supports NPM, Bower and jspm.☆22Oct 8, 2016Updated 9 years ago
- Specifications of the Futuristic Connectivity protocol☆28Oct 6, 2016Updated 9 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- certgrep is a cross-platform command line tool that extracts SSL certificates from either a network interface or a local PCAP file.☆18Nov 12, 2021Updated 4 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆15Aug 17, 2018Updated 7 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- Manage lockfiles in PKGBUILDs for upstreams that don't ship them, `updpkgsums` for dependency trees (Arch Linux tooling)☆14Mar 13, 2026Updated last week
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- How to Zeek Sysmon Logs!☆103Feb 12, 2022Updated 4 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago