Template for building a packet sniffer
☆15Mar 25, 2024Updated last year
Alternatives and similar repositories for sniffer-template
Users that are interested in sniffer-template are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- ☆10Mar 12, 2025Updated last year
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Mar 3, 2026Updated 3 weeks ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆27Apr 27, 2015Updated 10 years ago
- ☆10Mar 1, 2016Updated 10 years ago
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆260Feb 9, 2026Updated last month
- Ansible integration for Secrets Manager☆13Updated this week
- Learning Python for Forensics, Second Edition, Published by Packt☆11Apr 5, 2019Updated 6 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆124Nov 19, 2020Updated 5 years ago
- ☆14Aug 14, 2024Updated last year
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆28Sep 23, 2025Updated 6 months ago
- ☆15Dec 7, 2022Updated 3 years ago
- A data module for importing UFDR report files☆13Oct 12, 2020Updated 5 years ago
- Firmware for the TH3D EZPlug products. Based on Tasmota.☆18Apr 8, 2025Updated 11 months ago
- An OMR approach for finding signature in PDF files☆10Jan 29, 2018Updated 8 years ago
- line based tcp load balancing proxy.☆14Jun 18, 2024Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆151Mar 1, 2026Updated 3 weeks ago
- An extensible deep packet inspector.☆27Aug 1, 2025Updated 7 months ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- A LLVM-based toolchain for Linux designed to build a portable osquery☆41Mar 12, 2026Updated last week
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Simple scripts aiding penetration testing process☆15Mar 10, 2020Updated 6 years ago
- ☆20Nov 13, 2025Updated 4 months ago
- ☆11Dec 4, 2024Updated last year
- The Simple Little Automator☆12Oct 2, 2025Updated 5 months ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Smart sockets and scalability protocols for messaging network applications☆17Dec 2, 2024Updated last year
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- Utility Bash shell scripts I've written - typically these will run on Unix, Linux, OS X, and Cygwin☆16Jan 27, 2026Updated last month
- sample input data for zq☆15Nov 21, 2025Updated 4 months ago
- Proxy wired iOS internet connection and only allow cert server communication for safe agent signing☆13Aug 3, 2023Updated 2 years ago
- Sets up all the layers needed to log in over ssh with ssh keys☆17Jul 29, 2025Updated 7 months ago