☆16Dec 26, 2022Updated 3 years ago
Alternatives and similar repositories for pcapoptikon
Users that are interested in pcapoptikon are comparing it to the libraries listed below
Sorting:
- FW1-Loggrabber is a command-line tool to grab logfiles from remote Checkpoint devices using OPSEC LEA (Log Export API)☆53Jul 1, 2019Updated 6 years ago
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Improvements of/over the original rule2alert☆56Dec 28, 2014Updated 11 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- Volatility plugins☆12Feb 19, 2015Updated 11 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- ☆15Sep 24, 2024Updated last year
- BuffaLogs is an Open Source Django App whose main purpose is to detect login anomalies☆63Feb 25, 2026Updated last week
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- Honeynet Project Static Site☆19Feb 16, 2026Updated 2 weeks ago
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- ☆16Dec 5, 2023Updated 2 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Development moved to https://github.com/mhsys/mh☆14Feb 20, 2018Updated 8 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- ☆46Nov 25, 2013Updated 12 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Query network abuse contacts for a given ip address on abuse-contacts.abusix.zone☆20Nov 13, 2020Updated 5 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Printer honeypot☆21Jan 28, 2016Updated 10 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Fast Advanced Spam Analysis Tool☆306Aug 6, 2025Updated 6 months ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- ☆16Jan 31, 2015Updated 11 years ago