PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.
☆164Mar 27, 2025Updated 11 months ago
Alternatives and similar repositories for PcapMonkey
Users that are interested in PcapMonkey are comparing it to the libraries listed below
Sorting:
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- Open source pre-operation C2 server based on python and powershell☆762Jul 6, 2021Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆223May 1, 2021Updated 4 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 6 months ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- ☆33Aug 14, 2020Updated 5 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- VoIP honeypot system☆21Apr 2, 2024Updated last year
- ☆16Dec 26, 2022Updated 3 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆449Jan 16, 2024Updated 2 years ago
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- Windows Events Attack Samples☆2,517Jan 24, 2023Updated 3 years ago
- ☆21Oct 16, 2021Updated 4 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆462Updated this week
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,338Dec 13, 2022Updated 3 years ago
- ☆183May 27, 2024Updated last year
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- Harvis is designed to automate your C2 Infrastructure.☆106Jul 10, 2022Updated 3 years ago
- Security event correlation engine for ELK stack☆447Jun 26, 2024Updated last year
- ☆19Dec 12, 2023Updated 2 years ago
- Command line utility and Python package to ease the (un)mounting of forensic disk images☆127Feb 9, 2023Updated 3 years ago
- Defences against Cobalt Strike☆1,296Jul 14, 2022Updated 3 years ago
- A Binary Genetic Traits Lexer Framework☆523Feb 27, 2026Updated last week
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated this week
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58May 24, 2021Updated 4 years ago
- Threat Hunting tool about Sysmon and graphs☆337May 28, 2023Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- Multicore EVTX to Elasticsearch ingestor for incident responders.☆14May 12, 2021Updated 4 years ago
- InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date…☆585Apr 5, 2022Updated 3 years ago
- ☆29Sep 27, 2020Updated 5 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Malware repository component for samples & static configuration with REST API interface.☆379Updated this week