FCSC-FR / shovelLinks
Web interface to explore Suricata EVE outputs
☆67Updated last week
Alternatives and similar repositories for shovel
Users that are interested in shovel are comparing it to the libraries listed below
Sorting:
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 7 months ago
- ☆49Updated 3 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆151Updated 9 months ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆85Updated 4 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 2 years ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆163Updated 9 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 5 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆27Updated 11 months ago
- Write ups for Ph0wn CTF☆44Updated 2 weeks ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated 2 years ago
- eBPF hacks☆187Updated 8 months ago
- A script to download all the challenges and files from the CTFd instance.☆58Updated 2 months ago
- ☆55Updated 10 months ago
- The most complete code auditing platform with thousands of real-world challenges☆125Updated 2 months ago
- ☆97Updated 2 months ago
- Collection of steganography tools for images and text☆41Updated last year
- Binary Exploitation Phrack CTF Challenge☆121Updated last week
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 8 months ago
- ☆49Updated 10 months ago
- A full CTF Website Server & Frontend | Extremely customizable☆59Updated last year
- General purpose attack-defense range for zero-config deployment☆31Updated 6 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆201Updated 10 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 11 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 3 months ago
- ☆35Updated 2 years ago
- SNMPv3 Authentication Bruteforcer☆36Updated 4 years ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆58Updated 2 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 3 months ago