Cisco-Talos / file2pcap
☆168Updated 3 years ago
Alternatives and similar repositories for file2pcap:
Users that are interested in file2pcap are comparing it to the libraries listed below
- a network packet capture compiler☆198Updated 2 years ago
- ☆75Updated 3 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Various Bro scripts☆96Updated 8 years ago
- ☆202Updated last year
- ☆151Updated 6 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Bro scripts written by CrowdStrike Services☆146Updated 3 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- ☆307Updated 7 years ago
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆150Updated 10 months ago
- The Seeker of IOC☆129Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Django web interface for managing Yara rules☆191Updated 6 years ago
- Differential Analysis of Malware in Memory☆211Updated 7 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆121Updated 3 years ago
- Malware Repository Framework☆100Updated 7 years ago
- Rule sets for Sagan☆102Updated 4 years ago
- Web service for scanning pcaps with snort☆108Updated 6 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆155Updated 9 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago