Help summarize a PCAP file
☆33Dec 27, 2011Updated 14 years ago
Alternatives and similar repositories for pcap_tools
Users that are interested in pcap_tools are comparing it to the libraries listed below
Sorting:
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- ☆29Feb 25, 2017Updated 9 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Coming to a place near you.....☆25Jun 29, 2015Updated 10 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- ☆18May 7, 2019Updated 6 years ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- Search pastebin for keywords using python☆33Mar 12, 2012Updated 14 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- ☆15Aug 11, 2019Updated 6 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- Hogzilla is an Intrusion Detection System (IDS) supported by Snort, Apache Spark, HBase and libnDPI, which provides Network Anomaly Detec…☆28Apr 18, 2018Updated 7 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 3 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago