cssaheel / dissectorsLinks
This project is part of improving Cuckoo Sandbox, for more information https://honeynet.org/gsoc/slot3 I will use Scapy to write protocols dissectors for: TCP, UDP, ICMP, DNS, HTTP, FTP, IRC, SMB, SIP, TELNET, SSH, IMAP, POP and H.323
☆107Updated 6 years ago
Alternatives and similar repositories for dissectors
Users that are interested in dissectors are comparing it to the libraries listed below
Sorting:
- ☆86Updated 2 years ago
- A malware/botnet analysis framework written in Ruby.☆195Updated 2 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 10 years ago
- protocol fuzzing toolkit☆128Updated 6 years ago
- RTSP network protocol fuzzer☆65Updated 11 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 8 years ago
- Some tools to monitor BillGates CnC servers☆136Updated 11 years ago
- Scapy with dependencies for Python 2.7 on x86_64☆58Updated 11 years ago
- A configurable SQL injection test-bed☆123Updated 12 years ago
- Some kernel exploit i wrote☆76Updated 11 years ago
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆91Updated 12 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 10 years ago
- Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.☆78Updated 10 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆97Updated 11 years ago
- Heartbleed (CVE-2014-0160) client exploit☆326Updated 10 years ago
- ☆113Updated 8 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 12 years ago
- ☆91Updated 4 years ago
- ☆48Updated 3 years ago
- ☆42Updated 3 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 8 years ago
- Nmap scans of Internet of Things devices☆121Updated 10 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 10 years ago
- ssh key exchange layer for scapy☆13Updated 11 years ago
- system scanner☆222Updated 3 years ago
- Reassembles UDP/TCP packets into application layer messages.☆42Updated 7 years ago
- Juniper backdoor☆14Updated 10 years ago
- ☆40Updated 9 years ago
- An SDN penetration testing toolkit☆117Updated last year