Python Chained Generators for Network Streams:
☆40Dec 21, 2020Updated 5 years ago
Alternatives and similar repositories for chains
Users that are interested in chains are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Packet capture libraries benchmark☆35Jan 31, 2021Updated 5 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Oct 25, 2019Updated 6 years ago
- Tools to analyze SSL/TLS Client hellos from a packet capture.☆15Oct 15, 2014Updated 11 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Extract wav from pcap (rtp)☆14Jul 17, 2018Updated 7 years ago
- wireless client identification☆18Nov 26, 2014Updated 11 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆30Apr 17, 2020Updated 5 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- Multithreaded HTTP Download Accelerator☆23Jul 27, 2014Updated 11 years ago
- Tranalyzer generates extended netflow-like flow statistics from large pcap files or extensive ethernet interface measurements. It is inte…☆18Nov 14, 2018Updated 7 years ago
- ☆24Mar 29, 2020Updated 5 years ago
- MetFS is FUSE based, encrypted, dynamic sized filesystem software.☆18Jun 19, 2015Updated 10 years ago
- Signature libraries for Binary Ninja☆16Mar 18, 2020Updated 6 years ago
- Geolocating Internet infrastructure☆13Apr 26, 2018Updated 7 years ago
- Personal scripts and utilities☆13Jul 14, 2018Updated 7 years ago
- This script can be used by Frida to hijack SSL context and okhttp CertificateBuilder☆11Dec 31, 2020Updated 5 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 4 years ago
- The rev.ng demos☆13Mar 11, 2026Updated 2 weeks ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- Reverse-Engineering of the NABU PC's Network Adapter, one of the first cable data modems.☆12Mar 28, 2024Updated last year
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆451Updated this week
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 3 years ago
- Read out firmware of some STM32 parts☆13Jul 20, 2025Updated 8 months ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- Real-time Packet Observation Tool☆39Sep 26, 2023Updated 2 years ago
- Archived. Curve25519 support has been integrated into mirage-crypto-ec (via fiat-crypto). Hacl bindings are available from the hacl-star …☆20Apr 23, 2021Updated 4 years ago
- Re-implementation of the protocol reverse engineering approach FieldHunter☆17Oct 17, 2022Updated 3 years ago
- Fork of Arduino UNO/Mega Simulator.☆12Jun 19, 2016Updated 9 years ago
- ☆13Sep 22, 2025Updated 6 months ago
- Azure Sphere micropython☆11Jan 16, 2020Updated 6 years ago
- A cool way to work with bolt database buckets☆11May 19, 2016Updated 9 years ago
- Alleycat plugin by devttys0, ported to IDA 7☆16Apr 29, 2018Updated 7 years ago
- python framework to parse logs for IR☆15May 2, 2021Updated 4 years ago
- ☆11Dec 4, 2024Updated last year
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- Blinking Led Project☆10Aug 29, 2023Updated 2 years ago
- ACPI ASL highlighting for vim☆13Jul 30, 2016Updated 9 years ago