benjeems / packetStrider
A network packet forensics tool for SSH
☆252Updated 4 years ago
Alternatives and similar repositories for packetStrider:
Users that are interested in packetStrider are comparing it to the libraries listed below
- A malware analysis and classification tool.☆190Updated 3 years ago
- snake - a malware storage zoo☆218Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- simple YARA-based IOC scanner☆169Updated last month
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆449Updated 2 years ago
- IOC from articles, tweets for archives☆313Updated last year
- Endpoint detection & Malware analysis software☆230Updated 5 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated 2 weeks ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- Miscellaneous Malware RE☆195Updated 2 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆432Updated 5 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 4 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆207Updated 6 years ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- ☆168Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- Code + documentation for the public GreyNoise API☆314Updated 3 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆538Updated last year
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- Easy files and payloads delivery over DNS☆422Updated 11 months ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago
- Toolset for research malware and Cobalt Strike beacons☆209Updated 2 weeks ago
- ☆281Updated 7 years ago
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆235Updated last year
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated 11 months ago
- SNIcat☆126Updated 3 years ago