This project is part of improving Cuckoo Sandbox, for more information https://honeynet.org/gsoc/slot3 I will use Scapy to write protocols dissectors for: TCP, UDP, ICMP, DNS, HTTP, FTP, IRC, SMB, SIP, TELNET, SSH, IMAP, POP and H.323
☆107Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for dissectors
Users that are interested in dissectors are comparing it to the libraries listed below
Sorting:
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- HLS OSMF plugin - help to view m3u8 streams in the KDP/V2 player☆14Nov 16, 2020Updated 5 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Antenna Sector Patterns as obtained by Measurements in the CoNEXT'17 paper☆15Jan 24, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Some NSE scripts to search information from routers☆36Nov 30, 2015Updated 10 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Jun 20, 2016Updated 9 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- Chrome 扩展,为百度搜索添加必应壁纸。☆11Jun 29, 2015Updated 10 years ago
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- PoC of the Hundred Finance March 2022 exploit☆10Nov 10, 2022Updated 3 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Oct 28, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- Use back camera capturing make WeChat's message content page's background transparent☆12Aug 17, 2016Updated 9 years ago
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- Some xposed modules☆16Nov 27, 2018Updated 7 years ago
- Moxa Nport devices enumerate script☆16Apr 9, 2016Updated 9 years ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Feb 12, 2018Updated 8 years ago
- IRMA brain☆21Nov 28, 2016Updated 9 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- A domain/ip fuzzing tool for vulnerability mining☆99Mar 13, 2015Updated 10 years ago
- googleusercontent.com as HTTP(S) proxy☆54Sep 12, 2020Updated 5 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- 烛龙 -- 基于Docker的环境快速搭建系统☆12Dec 2, 2016Updated 9 years ago
- Surface Analysis System on Cloud☆19Dec 21, 2023Updated 2 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago