SuperCowPowers / chains
Python Chained Generators for Network Streams:
☆40Updated 4 years ago
Alternatives and similar repositories for chains:
Users that are interested in chains are comparing it to the libraries listed below
- ☆47Updated 2 years ago
- Workbench: A scalable python framework for security research and development teams.☆91Updated 5 years ago
- Python bindings for ssdeep☆91Updated 3 years ago
- ☆75Updated 3 years ago
- OpenFlow Honeypot☆23Updated 12 years ago
- ☆21Updated 9 years ago
- Documentation, sample inputs, and sample programs that use the dpkt library☆87Updated 8 years ago
- malware-traffic-analysis.net PCAPs repository.☆35Updated 8 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Misc. Bro scripts☆63Updated 7 years ago
- Parse Yara rules and operate over them more easily.☆52Updated 6 years ago
- BASS - BASS Automated Signature Synthesizer☆174Updated 6 years ago
- Python bindings to libhtp☆30Updated 4 years ago
- integrating bro into yara☆33Updated 10 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 3 years ago
- ☆10Updated 9 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- ☆25Updated 8 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Pure Python library for handling libpcap savefiles.☆77Updated 10 months ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆105Updated 8 years ago
- ☆85Updated 11 years ago
- ☆26Updated 9 years ago
- scan-detection policies for bro☆16Updated 3 months ago
- ssh key exchange layer for scapy☆13Updated 10 years ago