Tool used to perform threat intelligence against packet data
☆36Jan 26, 2025Updated last year
Alternatives and similar repositories for pktIntel
Users that are interested in pktIntel are comparing it to the libraries listed below
Sorting:
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Turn Ducky Scripts into QMK ready SEND_STRING() macros☆19Nov 14, 2019Updated 6 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Let's obscure some IPv4 addresses☆39Updated this week
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Oct 19, 2021Updated 4 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- ☆45Mar 7, 2026Updated 2 weeks ago
- Official Website Of The Sigma Project☆23Feb 16, 2026Updated last month
- Parses for Google Analytic values in raw files like RAM, DD images etc.☆18Apr 17, 2016Updated 9 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Jun 12, 2020Updated 5 years ago
- Parse OS X and iPhone Safari Internet History☆22Jul 21, 2014Updated 11 years ago
- Convert TI SmartRF Bluetooth Low Energy Packet Captures to Libpcap Format☆18Dec 11, 2014Updated 11 years ago
- Script to parse the Thunderbird email, including deleted email☆36Jul 21, 2014Updated 11 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- Create Password lists for cracking lyrical passwords☆17May 11, 2024Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Apr 7, 2023Updated 2 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Aug 1, 2022Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Jan 3, 2022Updated 4 years ago
- Collection of scripts provided for public use☆40Feb 4, 2026Updated last month
- Scapy packet fragment reassembly engines☆35Jan 24, 2021Updated 5 years ago
- DNSSECChef: DNS/DNSSEC Interception Proxy☆37Mar 29, 2019Updated 6 years ago
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆129Jan 31, 2022Updated 4 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Oct 1, 2016Updated 9 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- This project is no longer maintained☆12May 10, 2020Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆78Aug 28, 2023Updated 2 years ago