ANSSI-FR / shovel
Web interface to explore Suricata EVE outputs
☆48Updated 2 months ago
Alternatives and similar repositories for shovel:
Users that are interested in shovel are comparing it to the libraries listed below
- ☆43Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆88Updated 3 weeks ago
- Resolve symbols from release rust binaries on Windows☆19Updated last year
- ☆55Updated 4 months ago
- Write ups for Ph0wn CTF☆41Updated 2 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆142Updated 3 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 5 months ago
- Breizh CTF 2024 - Challenges☆13Updated 8 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆46Updated 2 years ago
- DEbian Cve REproducer Tool☆22Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆88Updated 3 months ago
- ☆36Updated last year
- Powershell Linter☆50Updated 2 weeks ago
- ☆88Updated last month
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆59Updated 4 months ago
- An automatic Blind ROP exploitation tool☆196Updated last year
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆140Updated 3 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆48Updated 2 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆97Updated last week
- Binary Golf Grand Prix☆52Updated 3 weeks ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated 11 months ago
- ☆122Updated last year
- A tool for firmware cartography☆145Updated 2 months ago
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last month
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Where CTFs happen☆81Updated 8 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆93Updated 5 months ago