PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.
☆29Jan 3, 2022Updated 4 years ago
Alternatives and similar repositories for PCAP-Generation-Tools
Users that are interested in PCAP-Generation-Tools are comparing it to the libraries listed below
Sorting:
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 11 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- A collection of Bro scripts I've written☆41Jun 5, 2015Updated 10 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- C standard library and communication layer for the Supercard DSTwo☆14Sep 29, 2017Updated 8 years ago
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 3 months ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- vncreplay replays a VNC session from captured network traffic☆10Apr 15, 2025Updated 10 months ago
- A script to generate the Hackers Against Humanity deck.☆13Jan 21, 2024Updated 2 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Manage the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.☆13Jul 16, 2025Updated 7 months ago
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 3 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- AES Key Bruteforcer, used to disclose proper keys for Arm9LoaderHax exploit☆11May 19, 2016Updated 9 years ago
- ☆16Mar 27, 2025Updated 11 months ago
- ☆13Dec 7, 2023Updated 2 years ago
- Safety Risk Reliability Model Library☆12Jan 23, 2025Updated last year
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- ☆15May 6, 2021Updated 4 years ago
- dat.wallet☆17Jan 11, 2014Updated 12 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- Presentations, Videos, and Sample Source from Austin LLVM Meetups☆11Jul 23, 2020Updated 5 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago