Cisco-Talos / file2pcapLinks
☆174Updated 4 years ago
Alternatives and similar repositories for file2pcap
Users that are interested in file2pcap are comparing it to the libraries listed below
Sorting:
- ☆75Updated 3 years ago
- Extract files from network traffic with Zeek.☆103Updated 5 years ago
- a network packet capture compiler☆205Updated 3 years ago
- ☆206Updated 2 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- Protocol Analysis/Decoder Framework☆496Updated 3 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated 2 years ago
- Public Repository of all Publicly Available Packet Captures that I've used or come across☆182Updated 12 years ago
- Various Bro scripts☆96Updated 9 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- Bro scripts written by CrowdStrike Services☆148Updated 4 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- ☆154Updated 7 years ago
- File Scanning Framework☆295Updated 4 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆124Updated 5 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆290Updated 8 years ago
- 16,432 Free Yara rules created by☆391Updated 6 years ago
- BASS - BASS Automated Signature Synthesizer☆178Updated 7 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Updated 8 years ago
- Wireshark plugin to display Suricata analysis info☆95Updated 4 years ago
- A framework for receiving and redistributing abuse feeds☆125Updated 6 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆156Updated 7 months ago
- Differential Analysis of Malware in Memory☆214Updated 8 years ago
- A Yara rule generator for finding related samples and hunting☆162Updated 3 years ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- Suricata Extreme Performance Tuning guide☆214Updated 7 years ago
- Improvements of/over the original rule2alert☆56Updated 11 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 8 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Updated 2 years ago