Ocram95 / pcap_injectorLinks
A CLI tool for creating network covert channels within .pcap files.
☆12Updated last year
Alternatives and similar repositories for pcap_injector
Users that are interested in pcap_injector are comparing it to the libraries listed below
Sorting:
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆9Updated 11 months ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- cnvd_spider 国家信息安全漏洞共享平台的部分数据爬虫☆8Updated 7 years ago
- 计算机系统与网络安全作业,基于论文Off-Path TCP Sequence Number Inference Attack,建立的TCP通信模型,用于模拟攻击场景☆8Updated 5 years ago
- ☆15Updated 3 months ago
- ☆25Updated 3 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆18Updated 5 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Updated 8 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Updated 4 years ago
- ☆7Updated 5 years ago
- ☆14Updated last month
- ☆13Updated 3 years ago
- Insider threat detection via bert☆20Updated 3 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 3 years ago
- 西安电子科技大学-慧眼––基于客户端蜜罐和机器学习的风险网站检测系统☆12Updated 3 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆11Updated last year
- ☆16Updated 4 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆15Updated last month
- 布谷鸟异构图构建,对比学习☆11Updated 3 years ago
- ☆11Updated last year
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆13Updated last month
- Forest of random partitioning trees for point-wise and collective anomaly detection☆11Updated 8 months ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆13Updated 5 years ago
- High-speed, Load-Distributive Middlebox Detector☆10Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆95Updated 11 months ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 4 years ago
- Leveraging network topology for better fake account detection in social networks☆10Updated 2 years ago
- Detecting Tor Traffic using Deep Learning Techniques☆19Updated 4 years ago