Ocram95 / pcap_injectorLinks
A CLI tool for creating network covert channels within .pcap files.
☆13Updated last year
Alternatives and similar repositories for pcap_injector
Users that are interested in pcap_injector are comparing it to the libraries listed below
Sorting:
- ☆20Updated 3 weeks ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Updated 8 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆10Updated 6 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- Insider threat detection via bert☆20Updated 3 years ago
- ☆15Updated 3 months ago
- Detecting Tor Traffic using Deep Learning Techniques☆20Updated 5 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆16Updated 3 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆21Updated 5 months ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- Daily C2 threat intelligence feed☆17Updated this week
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆72Updated 2 years ago
- ☆16Updated 3 years ago
- Code for shelLM tool☆56Updated 7 months ago
- 布谷鸟异构图构建,对比学习☆11Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- ☆12Updated last year
- Interactive, dynamic, and realistic LLM honeypots☆60Updated 7 months ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆21Updated last month
- CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection☆16Updated last year
- Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
- Threat Hunting Malware Infrastructure☆11Updated last year
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Updated last year
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆65Updated 2 years ago
- ☆13Updated 3 years ago
- ☆19Updated last year