aquasecurity / traceeshark
Deep Linux runtime visibility meets Wireshark
☆259Updated last week
Alternatives and similar repositories for traceeshark:
Users that are interested in traceeshark are comparing it to the libraries listed below
- Threat-hunting tool for Linux☆441Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆236Updated last week
- Automation tool for Windows Deception Host Burn-In☆82Updated 2 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆163Updated 8 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆208Updated this week
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆215Updated last week
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆355Updated last month
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆150Updated 10 months ago
- ☆124Updated last week
- Canary Detection☆164Updated 10 months ago
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆241Updated this week
- Red Canary's eBPF Sensor☆101Updated 7 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆145Updated 4 months ago
- Halberd : Multi-Cloud Attack Platform☆246Updated last week
- ☆254Updated 2 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆50Updated last month
- quicmap is a simple yet quic (!) QUIC protocol scanner☆84Updated 11 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆98Updated 2 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆156Updated 2 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆202Updated 2 months ago
- HASH (HTTP Agnostic Software Honeypot)☆136Updated 9 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆117Updated 3 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆191Updated last month
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated 3 months ago
- An offensive data enrichment pipeline☆660Updated last week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Updated 2 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆287Updated last week
- Simple ethernet interface traffic monitor and reporting tool☆79Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆190Updated last week