Ocram95 / pcap_injectorLinks
A CLI tool for creating network covert channels within .pcap files.
☆13Updated last year
Alternatives and similar repositories for pcap_injector
Users that are interested in pcap_injector are comparing it to the libraries listed below
Sorting:
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated last year
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- ☆16Updated 5 months ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Updated 8 years ago
- 学生考勤系统(PHP项目)☆10Updated 6 years ago
- ☆20Updated 2 months ago
- ☆10Updated 4 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆11Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 4 years ago
- ☆10Updated 11 months ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Updated 7 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Updated last year
- ☆10Updated 2 years ago
- 布谷鸟异构图构建,对比学习☆11Updated 3 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆19Updated 5 years ago
- Dockerization of CICFlowMeter, with an entry point to accept command line parameters when running the container.☆14Updated 5 years ago
- Detecting Tor Traffic using Deep Learning Techniques☆21Updated 5 years ago
- Threat Hunting Malware Infrastructure☆10Updated last year
- ☆11Updated last year
- ☆13Updated 3 years ago
- ☆14Updated 2 years ago
- Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
- Daily C2 threat intelligence feed☆19Updated this week
- ☆11Updated 5 years ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆14Updated 5 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Updated 5 months ago
- WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, …☆18Updated 2 years ago