Learn about a network from a pcap file or reading from an interface
☆29Apr 6, 2024Updated last year
Alternatives and similar repositories for pcap-stats
Users that are interested in pcap-stats are comparing it to the libraries listed below
Sorting:
- Template for building a packet sniffer☆15Mar 25, 2024Updated last year
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆260Feb 9, 2026Updated last month
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 4 years ago
- ☆18Jan 18, 2022Updated 4 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 4 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆26Jul 10, 2024Updated last year
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Sep 20, 2016Updated 9 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆90Mar 2, 2026Updated 2 weeks ago
- An assessment tool to interact with Velocio PLCs☆13Sep 24, 2021Updated 4 years ago
- Intrusion Detection Honeypots Book Code☆28Aug 31, 2020Updated 5 years ago
- Hunt malware with Volatility☆49Mar 3, 2026Updated 2 weeks ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆11Jun 2, 2021Updated 4 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Jun 3, 2020Updated 5 years ago
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Jul 18, 2024Updated last year
- ☆11Apr 25, 2021Updated 4 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆118Mar 10, 2026Updated last week
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- ☆14Feb 10, 2021Updated 5 years ago
- ☆25Jul 23, 2024Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆28Aug 26, 2023Updated 2 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆131Oct 24, 2022Updated 3 years ago
- A PE Header-Based Antivirus Tool☆12Nov 14, 2014Updated 11 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆10Oct 1, 2022Updated 3 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- Automagically extract forensic timeline from volatile memory dump☆133Mar 5, 2026Updated 2 weeks ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago