elceef / dhcpf
Passive DHCP fingerprinting implementation
☆51Updated 8 years ago
Alternatives and similar repositories for dhcpf:
Users that are interested in dhcpf are comparing it to the libraries listed below
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆21Updated 2 years ago
- intel amt honeypot☆18Updated 7 years ago
- DHCP option injector☆41Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 8 years ago
- ☆21Updated 9 years ago
- Yara syntax highlighting☆25Updated 3 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- See here:☆42Updated 12 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 7 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆25Updated 6 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Passive DNS V2☆62Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆51Updated 3 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year