elceef / dhcpf
Passive DHCP fingerprinting implementation
☆51Updated 8 years ago
Alternatives and similar repositories for dhcpf:
Users that are interested in dhcpf are comparing it to the libraries listed below
- intel amt honeypot☆18Updated 7 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Updated 3 years ago
- See here:☆42Updated 12 years ago
- ☆15Updated 8 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆21Updated 2 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- ip6.arpa scanner☆31Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- DHCP option injector☆42Updated 4 years ago
- ☆19Updated 6 years ago
- ☆46Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Yara syntax highlighting☆25Updated 3 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago