activecm / sniffer-templateLinks
Template for building a packet sniffer
☆14Updated last year
Alternatives and similar repositories for sniffer-template
Users that are interested in sniffer-template are comparing it to the libraries listed below
Sorting:
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- Run zeek with zeekctl in docker☆55Updated last year
- a port made of honey for blocking people☆13Updated 5 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- Corelight@Home script☆44Updated last year
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆125Updated 4 years ago
- ☆53Updated 3 years ago
- ☆41Updated 5 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆84Updated last year
- A collection of tips for using MISP.☆74Updated 9 months ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Zeek Auxiliary Programs☆28Updated 2 weeks ago
- ☆72Updated 5 months ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- ☆55Updated 4 years ago
- My Jupyter Notebooks☆36Updated 6 months ago
- ☆36Updated 2 weeks ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆253Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆34Updated last year
- ☆90Updated this week
- Incident Response Network Tools☆24Updated 4 years ago
- an awesome list of active defense resources☆125Updated 5 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- A community event for security researchers to share their favorite notebooks☆108Updated last year