benjeems / packetStriderLinks
A network packet forensics tool for SSH
☆253Updated 4 years ago
Alternatives and similar repositories for packetStrider
Users that are interested in packetStrider are comparing it to the libraries listed below
Sorting:
- A malware analysis and classification tool.☆190Updated 4 years ago
- Endpoint detection & Malware analysis software☆229Updated 5 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆208Updated 7 years ago
- snake - a malware storage zoo☆217Updated 2 years ago
- simple YARA-based IOC scanner☆170Updated last week
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆159Updated 8 months ago
- Malware Sinkhole List in various formats☆102Updated 3 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆54Updated 7 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆91Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆288Updated 8 years ago
- Repository of yara rules☆46Updated 10 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 5 years ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆141Updated last year
- Pattern Extractor for Obfuscated Code☆300Updated 3 years ago
- Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.☆167Updated 2 years ago
- ☆174Updated 4 years ago
- Packet communication investigator☆91Updated 3 years ago
- Automated Tactics Techniques & Procedures☆259Updated 2 years ago
- Decept Network Protocol Proxy☆281Updated 2 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆80Updated 7 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆119Updated 5 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆267Updated 6 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Updated 3 years ago
- Miscellaneous Malware RE☆196Updated 3 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 4 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆119Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago