FCSC-FR / shovel
Web interface to explore Suricata EVE outputs
☆55Updated 4 months ago
Alternatives and similar repositories for shovel:
Users that are interested in shovel are comparing it to the libraries listed below
- ☆45Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 3 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 7 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- Write ups for Ph0wn CTF☆42Updated 4 months ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- ☆55Updated 6 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated last month
- ☆37Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 5 months ago
- Powershell Linter☆50Updated this week
- General purpose attack-defense range for zero-config deployment☆27Updated 2 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆153Updated 5 months ago
- Binary Golf Grand Prix☆55Updated last month
- An automatic Blind ROP exploitation tool☆205Updated last year
- ☆93Updated 3 months ago
- Resolve symbols from release rust binaries on Windows☆20Updated last year
- Get information about stripped rust executables☆31Updated 2 weeks ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last month
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆117Updated this week
- This tool allows to automatically test for Content Security Policy bypass payloads.☆43Updated 8 months ago
- A tool for firmware cartography☆147Updated 4 months ago
- ☆38Updated 6 months ago
- A script to download all the challenges and files from the CTFd instance.☆55Updated last week
- ☆51Updated 6 months ago
- Collection of codes focused on Linux rootkits☆107Updated 2 months ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆25Updated last week
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆112Updated 3 weeks ago