Ocram95 / pcap_injectorLinks
A CLI tool for creating network covert channels within .pcap files.
☆13Updated last year
Alternatives and similar repositories for pcap_injector
Users that are interested in pcap_injector are comparing it to the libraries listed below
Sorting:
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated last year
 - This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
 - Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago
 - 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Updated 8 years ago
 - ☆15Updated 5 months ago
 - ☆20Updated 2 months ago
 - Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Updated 7 years ago
 - Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
 - Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Updated last year
 - Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
 - Detecting Tor Traffic using Deep Learning Techniques☆20Updated 5 years ago
 - Threat Hunting Malware Infrastructure☆10Updated last year
 - A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Updated 4 months ago
 - ☆59Updated 7 years ago
 - Building an Intrusion detection system using KDD Cup 99 Dataset☆14Updated 5 years ago
 - Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆66Updated 6 years ago
 - Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
 - ☆13Updated 2 years ago
 - A list of attacks or malware using steganography or information hiding☆67Updated last year
 - GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆74Updated 2 years ago
 - LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆24Updated 7 months ago
 - Insider threat detection via bert☆22Updated 3 years ago
 - The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
 - Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆27Updated last month
 - Daily C2 threat intelligence feed☆19Updated this week
 - ☆26Updated last year
 - SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆13Updated last year
 - An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆54Updated 2 weeks ago
 - Feature Extraction and Machine Learning from Network Traffic Traces☆72Updated last year
 - The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆17Updated 3 years ago