A platform built for easy-to-use automated network traffic analysis
☆60Dec 16, 2022Updated 3 years ago
Alternatives and similar repositories for packet_cafe
Users that are interested in packet_cafe are comparing it to the libraries listed below
Sorting:
- Network Tools☆34Nov 28, 2023Updated 2 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- A Networking Packet Capture and Flow Analysis Operator☆16Mar 18, 2022Updated 3 years ago
- Maritime Situational Awareness: An Exploration☆45Jun 10, 2025Updated 8 months ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- ☆18Jan 23, 2023Updated 3 years ago
- Quick iOS Backup UnFunkerizor☆22May 25, 2021Updated 4 years ago
- Python interface for Seek Thermal device☆20Aug 5, 2015Updated 10 years ago
- An SDR-based open-source C-V2X traffic generator for stress testing vehicular communication☆30May 10, 2022Updated 3 years ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Apr 20, 2022Updated 3 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Jun 6, 2024Updated last year
- ☆22Jan 12, 2024Updated 2 years ago
- Concourse k8s-based environment☆30Dec 12, 2023Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- Application for STIX v2.0 objects management and analysis☆27Nov 9, 2017Updated 8 years ago
- ☆35Feb 24, 2026Updated last week
- An Open framework to rate the exposure of ip addresses with services exposed to the internet☆31Dec 20, 2017Updated 8 years ago
- misp-cloud - Cloud-ready images of MISP☆74Aug 24, 2022Updated 3 years ago
- Scripts to generate an Internet simulation☆36Aug 6, 2024Updated last year
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated 11 months ago
- WhatsApp Bot 🌟 - for groups and individuals☆11Sep 30, 2023Updated 2 years ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Open Virginia GIS is a repository of gis data mapping the Commonwealth of Virginia, its localities, features, demographics, etc. Census d…☆16Jan 28, 2019Updated 7 years ago
- DOS Program Development☆13Nov 9, 2022Updated 3 years ago
- ChatterBot: Machine learning in Python ChatterBot ChatterBot is a machine-learning based conversational dialog engine build in Python whi…☆11Dec 18, 2019Updated 6 years ago
- This is the Arduino Library for ELEGOO Smart Robot Car Kit☆10Jun 3, 2024Updated last year
- ☆16Updated this week
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆46Mar 2, 2020Updated 6 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- The BirdsEye RL/RF project enables localization of mobile radio frequency targets, e.g., drones operators, via commericial off-the-shelf …☆51Jun 10, 2025Updated 8 months ago
- Definition, description and relationship types of MISP objects☆105Feb 26, 2026Updated last week