benjeems / packetStriderLinks
A network packet forensics tool for SSH
☆253Updated 4 years ago
Alternatives and similar repositories for packetStrider
Users that are interested in packetStrider are comparing it to the libraries listed below
Sorting:
- A malware analysis and classification tool.☆190Updated 4 years ago
- Endpoint detection & Malware analysis software☆230Updated 6 years ago
- Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.☆168Updated 2 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆209Updated 7 years ago
- snake - a malware storage zoo☆217Updated 2 years ago
- Automated Tactics Techniques & Procedures☆259Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆160Updated 9 months ago
- Malware Sinkhole List in various formats☆103Updated 3 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆57Updated 7 years ago
- simple YARA-based IOC scanner☆172Updated last month
- GreyNoise Query Language☆82Updated 6 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Cross-platform Yara scanner written in Go☆328Updated 2 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆435Updated 6 years ago
- Repository of yara rules☆47Updated 10 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 8 years ago
- Detecting ATT&CK techniques & tactics for Linux☆257Updated 5 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆119Updated 5 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Updated 5 years ago
- Linux Incident Response☆90Updated 6 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆91Updated last year
- ☆174Updated 4 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆543Updated 8 months ago
- Simple High Interaction Honeypot Solution for SMB protocol☆50Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 4 years ago
- Detecting Lateral Movement with Machine Learning☆139Updated 8 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆111Updated 6 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 7 years ago
- repository of tools & resources of the MMD team☆137Updated 3 years ago