Cisco-Talos / file2pcap
☆169Updated 3 years ago
Alternatives and similar repositories for file2pcap:
Users that are interested in file2pcap are comparing it to the libraries listed below
- ☆202Updated last year
- a network packet capture compiler☆197Updated 2 years ago
- ☆75Updated 3 years ago
- Extract files from network traffic with Zeek.☆101Updated 4 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆121Updated 3 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆149Updated 9 months ago
- Bro scripts written by CrowdStrike Services☆146Updated 3 years ago
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Django web interface for managing Yara rules☆190Updated 6 years ago
- Various Bro scripts☆96Updated 8 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Differential Analysis of Malware in Memory☆211Updated 7 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- ☆308Updated 7 years ago
- ☆150Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- Suricata Extreme Performance Tuning guide☆207Updated 6 years ago
- Yara rules for malware families seen as part of targeted threats project☆135Updated 8 years ago
- Malware Repository Framework☆100Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Honeynet Project generic authenticated datafeed protocol☆215Updated last year
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 5 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆123Updated 4 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago