FireyFly / websharkLinks
🦈 Tool for visualizing packet captures.
☆44Updated 5 years ago
Alternatives and similar repositories for webshark
Users that are interested in webshark are comparing it to the libraries listed below
Sorting:
- Potiron - Normalize, Index and Visualize Network Capture☆87Updated 6 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- Python pcap sanitizer☆21Updated 3 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 6 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆109Updated 2 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 11 years ago
- BGP Hijack Detection☆115Updated 7 years ago
- Plugins written for CVE-Search☆27Updated 4 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Ansible configurations for distributed MultiScanner installations☆14Updated 6 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23Updated 9 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 12 years ago
- BGP Route Leaks Detection☆71Updated 6 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- A RESTful API frontend for Stenographer☆54Updated 2 years ago
- DHCP option injector☆42Updated 5 years ago
- API to use Cymru services☆27Updated 11 years ago
- Diff two or more PCAP files☆112Updated 4 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- A scalable framework for binary analysis in a containered environment.☆13Updated 6 years ago
- Some scripts for attacks on Tacacs+ protocol☆65Updated 6 years ago
- Flow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files☆44Updated last year
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- Create an intuitive and interactive graph of a client's IP traffic☆28Updated 7 years ago