Learn about a network from a pcap file or reading from an interface
☆29Apr 6, 2024Updated 2 years ago
Alternatives and similar repositories for pcap-stats
Users that are interested in pcap-stats are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Template for building a packet sniffer☆15Mar 25, 2024Updated 2 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆50Mar 29, 2023Updated 3 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆260Feb 9, 2026Updated 2 months ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆27Jul 10, 2024Updated last year
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Apr 27, 2015Updated 10 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Intrusion Detection Honeypots Book Code☆28Aug 31, 2020Updated 5 years ago
- Hunt malware with Volatility☆49Mar 3, 2026Updated last month
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆11Jun 2, 2021Updated 4 years ago
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Jul 18, 2024Updated last year
- ☆11Apr 25, 2021Updated 4 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆119Mar 10, 2026Updated last month
- ☆13Feb 10, 2021Updated 5 years ago
- ☆25Jul 23, 2024Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆21Aug 29, 2022Updated 3 years ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆28Aug 26, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆131Oct 24, 2022Updated 3 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆10Oct 1, 2022Updated 3 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆29Sep 23, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 8 months ago
- HAR object eXtractor.☆14Apr 23, 2019Updated 6 years ago
- -OFFICIAL REPO - DISA STIG Compliance Automation leveraging Puppet, Ansible, and Bash☆12Nov 18, 2014Updated 11 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- Using cloudflare workers and DOs to make a https tunnel that scales☆25Nov 22, 2025Updated 4 months ago
- Packet Dump Decode - one-click packet hexdump decode☆18Jun 20, 2015Updated 10 years ago
- A Bro package to identify connections that are bursting (lots of data and transferring quickly).☆13Oct 15, 2020Updated 5 years ago