andrewg-felinemenace / PCAP-Generation-ToolsView external linksLinks
PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.
☆29Jan 3, 2022Updated 4 years ago
Alternatives and similar repositories for PCAP-Generation-Tools
Users that are interested in PCAP-Generation-Tools are comparing it to the libraries listed below
Sorting:
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- A collection of Bro scripts I've written☆41Jun 5, 2015Updated 10 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 2 months ago
- C standard library and communication layer for the Supercard DSTwo☆14Sep 29, 2017Updated 8 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Adding client SOCKS support to Twisted.☆18Feb 2, 2014Updated 12 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 3 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- ☆15May 6, 2021Updated 4 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Manage the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.☆13Jul 16, 2025Updated 7 months ago
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 2 years ago
- ☆16Mar 27, 2025Updated 10 months ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Presentations, Videos, and Sample Source from Austin LLVM Meetups☆11Jul 23, 2020Updated 5 years ago
- miscellaneous scripts and things...☆22May 12, 2016Updated 9 years ago
- ☆11Jan 5, 2021Updated 5 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- example.on('end', mustCall(() => {})); Check the callback function is called.☆10Nov 20, 2022Updated 3 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago
- ☆12Oct 15, 2024Updated last year