Cisco-Talos / file2pcapLinks
☆174Updated 4 years ago
Alternatives and similar repositories for file2pcap
Users that are interested in file2pcap are comparing it to the libraries listed below
Sorting:
- Extract files from network traffic with Zeek.☆102Updated 5 years ago
- ☆75Updated 3 years ago
- a network packet capture compiler☆205Updated 3 years ago
- ☆206Updated 2 years ago
- Various Bro scripts☆96Updated 9 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated 2 years ago
- Differential Analysis of Malware in Memory☆215Updated 8 years ago
- Protocol Analysis/Decoder Framework☆496Updated 3 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Updated 8 years ago
- Public Repository of all Publicly Available Packet Captures that I've used or come across☆182Updated 13 years ago
- ☆154Updated 7 years ago
- Suricata Extreme Performance Tuning guide☆213Updated 7 years ago
- Wireshark plugin to display Suricata analysis info☆95Updated 4 years ago
- Bro scripts written by CrowdStrike Services☆148Updated 4 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆124Updated 5 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Updated 2 years ago
- ☆72Updated 4 years ago
- ☆85Updated 12 years ago
- Malware Repository Framework☆99Updated 7 years ago
- Automatic Yara Rule Generation☆333Updated 10 years ago
- CRITs Services Collection☆184Updated 4 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 8 years ago
- A framework for receiving and redistributing abuse feeds☆125Updated 6 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 6 years ago
- The default package source of the Zeek Package Manager. Wrote a package? See the README for how to get it included.☆144Updated last week
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Updated 8 years ago
- a Malware/Threat Analyst Desktop☆89Updated 10 years ago
- 16,432 Free Yara rules created by☆391Updated 6 years ago