elceef / dhcpf
Passive DHCP fingerprinting implementation
☆49Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for dhcpf
- Yara syntax highlighting☆25Updated 3 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆38Updated 11 years ago
- DHCP option injector☆39Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- API to use Cymru services☆27Updated 10 years ago
- Rekall is an endpoint security solution.☆39Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆54Updated last year
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- POC for IAT Parsing Payloads☆47Updated 7 years ago
- Bro PCAP Processing and Tagging API☆28Updated 7 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- ip6.arpa scanner☆32Updated 7 years ago
- The Swiss army knife of byte manipulation☆42Updated 8 years ago
- Command-line Interface for Binar.ly☆37Updated 7 years ago
- A curated list of tools for incident response☆27Updated 8 months ago
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- misc scripts☆36Updated 6 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆36Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 8 years ago
- ☆15Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 5 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 10 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago