FCSC-FR / shovelLinks
Web interface to explore Suricata EVE outputs
☆84Updated last month
Alternatives and similar repositories for shovel
Users that are interested in shovel are comparing it to the libraries listed below
Sorting:
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 11 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆162Updated last year
- ☆50Updated 3 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆51Updated 3 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- General purpose attack-defense range for zero-config deployment☆39Updated last month
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆101Updated 9 months ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆88Updated 4 years ago
- A script to download all the challenges and files from the CTFd instance.☆61Updated 6 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆77Updated last year
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆28Updated last year
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- Write ups for Ph0wn CTF☆47Updated 4 months ago
- Runs exploits, fast.☆107Updated 2 months ago
- An Intrusion Prevention System for Attack-Defense CTFs☆51Updated last year
- ☆55Updated last year
- Binary Exploitation Phrack CTF Challenge☆139Updated 4 months ago
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆274Updated last month
- ☆100Updated 6 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Updated 3 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated last month
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 7 months ago
- Python tool to resolve all strings in Go binaries obfuscated by garble☆178Updated 10 months ago
- Search engine for CTF writeups with instant results.☆152Updated 10 months ago
- Breizh CTF 2024 - Challenges☆14Updated last year
- TLS & SNI aware netcat☆49Updated last year
- Challenges of the HeroCTF v5 edition.☆49Updated last year
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Updated last year