benjeems / packetStrider
A network packet forensics tool for SSH
☆253Updated 4 years ago
Alternatives and similar repositories for packetStrider
Users that are interested in packetStrider are comparing it to the libraries listed below
Sorting:
- A malware analysis and classification tool.☆190Updated 3 years ago
- Endpoint detection & Malware analysis software☆230Updated 5 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆434Updated 5 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- Automated Tactics Techniques & Procedures☆254Updated last year
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆207Updated 6 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- snake - a malware storage zoo☆216Updated last year
- ☆334Updated 2 years ago
- SNIcat☆126Updated 3 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆467Updated 4 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆669Updated last year
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- Easy files and payloads delivery over DNS☆422Updated last year
- A fully functional DanderSpritz lab in 2 commands☆427Updated 6 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated last month
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- simple YARA-based IOC scanner☆169Updated 3 months ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆173Updated 3 years ago
- ☆282Updated 7 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Updated 2 months ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- fireELF - Fileless Linux Malware Framework☆667Updated 6 years ago
- Pattern Extractor for Obfuscated Code☆298Updated 3 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆221Updated 4 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated 2 weeks ago