benjeems / packetStrider
A network packet forensics tool for SSH
☆253Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for packetStrider
- A malware analysis and classification tool.☆192Updated 2 years ago
- Endpoint detection & Malware analysis software☆226Updated 4 years ago
- Decept Network Protocol Proxy☆275Updated last year
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆443Updated 2 years ago
- Detecting ATT&CK techniques & tactics for Linux☆256Updated 4 years ago
- snake - a malware storage zoo☆217Updated last year
- PA Toolkit is a collection of traffic analysis plugins focused on security☆432Updated 5 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆285Updated 7 years ago
- Miscellaneous Malware RE☆195Updated 2 years ago
- This repo contains logstash of various honeypots☆174Updated 4 years ago
- simple YARA-based IOC scanner☆164Updated this week
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆144Updated 8 months ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- For all these times you're asking yourself "what is this panel again?"☆252Updated last year
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆462Updated 3 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆205Updated 6 years ago
- IOC from articles, tweets for archives☆311Updated 11 months ago
- Cross-platform Yara scanner written in Go☆330Updated last year
- GreyNoise Query Language☆80Updated 5 years ago
- A fully functional DanderSpritz lab in 2 commands☆419Updated 5 years ago
- Toolset for research malware and Cobalt Strike beacons☆206Updated last year
- Pattern Extractor for Obfuscated Code☆296Updated 2 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆704Updated last year
- Information released publicly by NCC Group's Cyber Incident Response Team☆474Updated 2 years ago
- Automated Tactics Techniques & Procedures☆251Updated last year
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆234Updated last year
- ☆279Updated 6 years ago