brendangregg / ChaosreaderLinks
An any-snarf program that processes application protocols (HTTP/FTP/...) from tcpdump or snoop files and stores session and file data
☆231Updated 3 years ago
Alternatives and similar repositories for Chaosreader
Users that are interested in Chaosreader are comparing it to the libraries listed below
Sorting:
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- Protocol Analysis/Decoder Framework☆493Updated 2 years ago
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆228Updated 4 years ago
- ☆172Updated 3 years ago
- Script for automating Linux memory capture and analysis☆270Updated 5 years ago
- Sguil client for NSM☆218Updated last year
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆85Updated 3 months ago
- Honeypot deployment made easy☆236Updated 6 years ago
- Wireshark plugin to display Suricata analysis info☆94Updated 3 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- Differential Analysis of Malware in Memory☆212Updated 8 years ago
- Open Source Network Forensic Analysis Tool (NFAT)☆191Updated 4 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆153Updated 9 years ago
- graph visualization tool☆78Updated 9 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Suricata Extreme Performance Tuning guide☆210Updated 7 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated last year
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- Application Layer IDS/IPS with iptables☆76Updated 6 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- ☆75Updated 3 years ago
- A Distributed, Search-Optimized Full Packet Capture System☆242Updated 2 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Decept Network Protocol Proxy☆277Updated 2 years ago
- a network packet capture compiler☆200Updated 3 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆435Updated 3 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆143Updated 3 weeks ago
- The Seeker of IOC☆129Updated 4 years ago
- Suricata rules for Emerging Threats and funkyness☆74Updated 8 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago