Help summarize a PCAP file
☆33Dec 27, 2011Updated 14 years ago
Alternatives and similar repositories for pcap_tools
Users that are interested in pcap_tools are comparing it to the libraries listed below
Sorting:
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- ☆29Feb 25, 2017Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 13 years ago
- Coming to a place near you.....☆25Jun 29, 2015Updated 10 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Modified edition of cuckoo community modules☆50May 12, 2017Updated 8 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Network visualizer tool built using Processing☆24Jun 23, 2021Updated 4 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Path bookmarking for bash. I use this extensively throughout my day.☆23Apr 22, 2020Updated 5 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago