ANSSI-FR / shovel
Web interface to explore Suricata EVE outputs
☆48Updated last month
Alternatives and similar repositories for shovel:
Users that are interested in shovel are comparing it to the libraries listed below
- A python module to explore the object tree to extract paths to interesting objects in memory.☆82Updated last month
- ☆43Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆136Updated 2 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆107Updated 2 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆26Updated 4 months ago
- Write ups for Ph0wn CTF☆40Updated last month
- Memory mapping profiles for forensic analysis using volatility 2☆46Updated 2 years ago
- ☆55Updated 3 months ago
- ☆85Updated last week
- ☆36Updated last year
- Challenges and write-ups for GCC-CTF 2024☆19Updated 10 months ago
- Binary Golf Grand Prix☆48Updated 4 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆45Updated 2 weeks ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆87Updated 2 months ago
- Breizh CTF 2024 - Challenges☆12Updated 7 months ago
- SNMPv3 Authentication Bruteforcer☆36Updated 3 years ago
- Where CTFs happen☆80Updated 7 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆38Updated last year
- Volatility, on Docker 🐳☆31Updated 6 months ago
- Resolve symbols from release rust binaries on Windows☆19Updated last year
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆80Updated 3 years ago
- TLS & SNI aware netcat☆37Updated 2 months ago
- Powershell Linter☆49Updated last month
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- ☆123Updated last year
- ☆130Updated 9 months ago
- DEbian Cve REproducer Tool☆22Updated last year
- A tool for firmware cartography☆142Updated 3 weeks ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆58Updated 3 months ago