FCSC-FR / shovelLinks
Web interface to explore Suricata EVE outputs
☆59Updated 6 months ago
Alternatives and similar repositories for shovel
Users that are interested in shovel are comparing it to the libraries listed below
Sorting:
- A python module to explore the object tree to extract paths to interesting objects in memory.☆97Updated 4 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- ☆47Updated 3 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆147Updated 7 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated 2 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 9 months ago
- ☆55Updated 8 months ago
- Network traffic analysis tool for Attack & Defense CTF's☆62Updated this week
- Write ups for Ph0wn CTF☆42Updated 6 months ago
- ☆38Updated 2 years ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 9 months ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 6 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆158Updated 7 months ago
- ☆52Updated 8 months ago
- A script to download all the challenges and files from the CTFd instance.☆56Updated last week
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 5 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆100Updated 3 months ago
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- Volatility, on Docker 🐳☆34Updated 2 months ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆26Updated last month
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆37Updated 8 months ago
- Collection of my volatility3 plugins☆18Updated 9 months ago
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- Powershell Linter☆61Updated this week
- Volatility3 Linux profiles☆48Updated 3 weeks ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 7 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆64Updated last month