Ocram95 / pcap_injectorLinks
A CLI tool for creating network covert channels within .pcap files.
☆12Updated 11 months ago
Alternatives and similar repositories for pcap_injector
Users that are interested in pcap_injector are comparing it to the libraries listed below
Sorting:
- A list of attacks or malware using steganography or information hiding☆64Updated last year
- IPv6CC implements several covert channels targeting the IPv6 protocol.☆11Updated 3 years ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆16Updated 2 months ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆46Updated 2 weeks ago
- A free online class on network information hiding/steganography/covert channels.☆101Updated last month
- A list of tools and material on steganography and information hiding☆16Updated last year
- Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC)…☆16Updated 2 months ago
- ☆14Updated last week
- Code for shelLM tool☆54Updated 4 months ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- ☆22Updated last year
- AIrmageddon is a home security AI Agent☆11Updated 9 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆33Updated this week
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆9Updated 10 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated 2 weeks ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Updated 11 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆116Updated last year
- ☆24Updated last year
- IPv6 Internet Wide Scanning☆18Updated 2 months ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆38Updated 8 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- Graphical map of known Advanced Persistent Threats☆54Updated 2 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated last month
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- ☆55Updated 6 years ago
- A framework for synthesizing lateral movement login data.☆24Updated 4 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆15Updated 5 years ago
- Summarize CTI reports with OpenAI☆16Updated this week