elceef / dhcpf
Passive DHCP fingerprinting implementation
☆50Updated 8 years ago
Alternatives and similar repositories for dhcpf:
Users that are interested in dhcpf are comparing it to the libraries listed below
- See here:☆42Updated 12 years ago
- DHCP option injector☆40Updated 4 years ago
- intel amt honeypot☆18Updated 7 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Updated 2 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆44Updated 5 years ago
- Passive DNS V2☆62Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Yara syntax highlighting☆25Updated 3 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆21Updated last year
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- ☆21Updated 9 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆39Updated 4 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- ☆15Updated 8 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 11 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 7 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 10 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- API to use Cymru services☆27Updated 11 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago