pcap and smcap python packet payload replayer - and much more!
☆23Feb 16, 2021Updated 5 years ago
Alternatives and similar repositories for pplay
Users that are interested in pplay are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DHCP fingerprints database and related tools☆19Nov 14, 2014Updated 11 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 4 months ago
- Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444☆16Sep 29, 2021Updated 4 years ago
- Statically compiled binaries for various architectures.☆18Oct 12, 2022Updated 3 years ago
- Arlo file format helper☆16Mar 7, 2024Updated 2 years ago
- Face morpher plus based on facemorpher☆12Aug 20, 2018Updated 7 years ago
- Patterns for the l7-filter packet classifier (kernel version). You can find new protocols at https://www.netify.ai/resources/protocols☆11Jun 18, 2014Updated 11 years ago
- Userspace (netlink) packet classifier☆14Oct 8, 2013Updated 12 years ago
- ☆13May 24, 2016Updated 9 years ago
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆16Jan 4, 2021Updated 5 years ago
- Siemens SIMATIC vulnerabilities☆24Feb 10, 2022Updated 4 years ago
- EtherNet/IP & CIP Stack Detector☆49Aug 4, 2022Updated 3 years ago
- Docker image for the Proxmox vma command line utility (disk image tool)☆26Aug 5, 2023Updated 2 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆93Jun 19, 2024Updated last year
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- ☆35Feb 10, 2023Updated 3 years ago
- goscanner is a tool for large-scale TLS and SSH scans☆33Jan 7, 2026Updated 2 months ago
- Patterns for the l7-filter packet classifier. You can find an updated list of protocols at https://www.netify.ai/resources/protocols☆25Oct 8, 2013Updated 12 years ago
- TLS 技术原理与 1.0协议旁路解密实现方法☆27Jan 12, 2019Updated 7 years ago
- Command-line utility for iteratively developing pipelines, deploying them at scale, and sharing data and derivatives☆10Jun 15, 2020Updated 5 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- Run android with S2E☆31Dec 11, 2014Updated 11 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- Examples for https://github.com/insomniacslk/dhcp☆16Mar 24, 2021Updated 4 years ago
- Exploiting Allen-Bradley E/IP PLCs☆82Apr 24, 2020Updated 5 years ago
- 一个可以全端口捕获流量的简易蜜罐 tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆13Aug 3, 2022Updated 3 years ago
- 📻 A Mand Mobile project example for Nuxt☆11Jan 4, 2023Updated 3 years ago
- Replacement for pyRouterLib - A library for easily accessing routers and switches via ssh, telnet, and snmp☆22Jan 29, 2026Updated last month
- A collaborative effort to liberate Sonos devices from their cloudy masters.☆63Mar 3, 2022Updated 4 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆40Sep 2, 2025Updated 6 months ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Run Windows95 on the web☆45Feb 21, 2025Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago