catalyst256 / gobblerLinks
Gobbling it's way through your pcap files
☆24Updated 10 years ago
Alternatives and similar repositories for gobbler
Users that are interested in gobbler are comparing it to the libraries listed below
Sorting:
- A Network Inspection Tool☆82Updated 7 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- ☆19Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Python libary to normalize Yara signatures☆19Updated 4 years ago
- Malware.lu tools☆63Updated 11 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- A warehouse for your malware☆133Updated 12 years ago
- ☆68Updated 8 years ago
- Malware analysis tool☆22Updated 4 months ago
- Security tools to use on assessments.☆39Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Scapy hands-on at #GreHack16☆15Updated 8 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 9 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆48Updated 8 years ago
- AYY LMAO☆22Updated 9 years ago
- ☆16Updated 10 years ago
- ripPE - section extractor and profiler for PE file analysis☆32Updated 11 years ago
- Volatility Plugins☆21Updated 10 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Websocket based egress tester☆20Updated 8 years ago