FCSC-FR / shovelLinks
Web interface to explore Suricata EVE outputs
☆60Updated 7 months ago
Alternatives and similar repositories for shovel
Users that are interested in shovel are comparing it to the libraries listed below
Sorting:
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 5 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆49Updated 2 years ago
- ☆47Updated 3 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆148Updated 7 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 3 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆160Updated 8 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆26Updated 9 months ago
- Write ups for Ph0wn CTF☆42Updated 7 months ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- ☆55Updated 9 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 6 months ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆82Updated 4 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆193Updated 9 months ago
- A script to download all the challenges and files from the CTFd instance.☆58Updated last month
- ☆37Updated 2 years ago
- 📦 A GitHub Action that performs a security scan of your GitHub Actions.☆26Updated 8 months ago
- The most complete code auditing platform with thousands of real-world challenges☆124Updated 3 weeks ago
- General purpose attack-defense range for zero-config deployment☆27Updated 4 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 8 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- ☆134Updated last year
- eBPF hacks☆188Updated 7 months ago
- Powershell Linter☆62Updated 2 weeks ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆44Updated 3 weeks ago
- All kinds of tiny shells☆58Updated 2 years ago
- ☆65Updated 2 months ago
- A volatility 2 docker for forensic investigations☆23Updated last year
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆27Updated 2 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆105Updated 2 weeks ago