TPs-ESIR-S9 / PcapFileAnalysis
Malicious Network Traffic Analysis with AI
☆14Updated last year
Alternatives and similar repositories for PcapFileAnalysis
Users that are interested in PcapFileAnalysis are comparing it to the libraries listed below
Sorting:
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆42Updated 2 weeks ago
- Useful scripts from past CTF challenges☆35Updated last month
- We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environme…☆48Updated 7 months ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆114Updated 2 months ago
- We want to create a Repo which can provide different Malwares wrote by Python.☆20Updated this week
- Challenge repository for the 2023 CSAW CTF Qualifiers☆30Updated last year
- Malicious PowerShell Dataset☆15Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆44Updated 7 months ago
- Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).☆18Updated 11 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆45Updated last year
- Attacks against QUIC (CVE-2022-30591)☆23Updated 2 years ago
- BRICS+ CTF 2024 Quals☆24Updated 7 months ago
- OFFZONE 2024 Malware Persistence workshop☆19Updated 5 months ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆51Updated 2 weeks ago
- Source code and solution of CTF challenges that I created.☆46Updated 11 months ago
- CVE-2023-4911☆16Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆66Updated last week
- Malware Detection using Machine Learning (MDML)☆51Updated 2 years ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆52Updated last year
- LLM Agent and Evaluation Framework for Autonomous Penetration Testing☆102Updated 5 months ago
- An Intrusion Prevention System for Attack-Defense CTFs☆44Updated 10 months ago
- ☆50Updated last week
- Collection of Volatility2 profiles, generated against Linux kernels.☆39Updated this week
- Official writeups for Business CTF 2024: The Vault Of Hope☆145Updated 5 months ago
- Easily debug processes running in docker containers☆22Updated 10 months ago
- Challenges, source code, and writeups for BYUCTF 2023☆26Updated last year
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆12Updated 2 weeks ago
- Python tool to parse and decrypt files quarantined by windows defender☆12Updated 2 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆23Updated last year
- Flag submission system for Attack/Defense CTFs☆13Updated 3 years ago