USArmyResearchLab / DshellLinks
Dshell is a network forensic analysis framework.
☆5,488Updated last year
Alternatives and similar repositories for Dshell
Users that are interested in Dshell are comparing it to the libraries listed below
Sorting:
- Advanced CPU-based password recovery utility☆2,156Updated 2 years ago
- Stenographer is a packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of…☆1,801Updated 4 years ago
- A system automation and configuration management stack targeted toward operational flexibility and policy compliance.☆1,334Updated 5 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,889Updated 4 years ago
- Foreign LINUX - Run unmodified Linux applications inside Windows.☆3,576Updated 9 years ago
- GRR Rapid Response: remote live forensics for incident response☆4,968Updated 3 months ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,501Updated 7 years ago
- Rekall Memory Forensic Framework☆1,973Updated 4 years ago
- A point to point color terminal video chat.☆2,896Updated last year
- Platform to host Capture the Flag competitions☆6,560Updated last year
- Gryffin is a large scale web security scanning platform.☆2,069Updated 4 years ago
- Distributed & real time digital forensics at the speed of the cloud☆1,204Updated 6 years ago
- Advanced library for randomization, hashing and statistical analysis (devoted to chaos machines).☆1,613Updated 5 years ago
- [OBSOLETE - see readme] A tool for creating GIF screencasts of a terminal, with key presses overlaid.☆3,103Updated 6 years ago
- OS X Auditor is a free Mac OS X computer forensics tool☆3,133Updated 5 years ago
- A large-scale entity and relation database supporting aggregation of properties☆1,792Updated 3 months ago
- *This project is no longer actively maintained. If you'd like to become the maintainer, please let us know.* ZeroDB is an end-to-end encr…☆1,555Updated 7 years ago
- (Deprecated) Lossless h.264 recoder/recompressor. For newest version see:☆1,066Updated 9 years ago
- ☆7,820Updated 4 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,798Updated 3 years ago
- Sandboxed Execution Environment☆818Updated 4 years ago
- Private messaging system that hides metadata☆2,483Updated 6 years ago
- Lightning fast code searching made easy☆5,774Updated last year
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,596Updated 3 months ago
- Speech and Vision Based Intelligent Personal Assistant☆4,800Updated 2 years ago
- Augmented Traffic Control: A tool to simulate network conditions☆4,328Updated 7 years ago
- Build your own IP Attack Maps with SOUND!☆1,059Updated 3 weeks ago
- HTTP/HTTPS MITM proxy and recorder.☆1,623Updated last year
- SQL powered operating system instrumentation, monitoring, and analytics.☆22,735Updated this week
- Warp speed Data Transfer (WDT) is an embeddedable library (and command line tool) aiming to transfer data between 2 systems as fast as p…☆2,917Updated this week