SuperCowPowers / chains
Python Chained Generators for Network Streams:
☆40Updated 4 years ago
Alternatives and similar repositories for chains:
Users that are interested in chains are comparing it to the libraries listed below
- Workbench: A scalable python framework for security research and development teams.☆91Updated 5 years ago
- ☆47Updated 2 years ago
- PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.☆28Updated 3 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 6 years ago
- BASS - BASS Automated Signature Synthesizer☆174Updated 6 years ago
- A collection of known Domain Generation Algorithms☆66Updated 8 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- (OBSOLETE) Plugins for Bro☆53Updated 7 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Parse Yara rules and operate over them more easily.☆52Updated 6 years ago
- Python bindings for ssdeep☆91Updated 3 years ago
- ☆21Updated 9 years ago
- ☆75Updated 3 years ago
- ☆25Updated 8 years ago
- malware-traffic-analysis.net PCAPs repository.☆35Updated 8 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- OpenVAS connector for versions 6, 7, 8 and 9☆80Updated 2 years ago
- Python bindings to libhtp☆30Updated 4 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆78Updated 9 years ago
- A Wireshark plugin providing a simple interface for writing dissectors in Python.☆170Updated 9 years ago
- A Python library for parsing, manipulating, and generating CybOX content.☆77Updated 4 years ago
- Documentation, sample inputs, and sample programs that use the dpkt library☆86Updated 8 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- A Cuckoo Sandbox Extension for Android☆76Updated 10 years ago
- Static and automated/dynamic malware analysis☆46Updated 9 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 7 years ago
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Updated 7 years ago