fireeye / RProxyLinks
☆110Updated 11 years ago
Alternatives and similar repositories for RProxy
Users that are interested in RProxy are comparing it to the libraries listed below
Sorting:
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Updated 8 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Updated 10 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Noddos client☆75Updated 5 years ago
- Python bindings to libhtp☆30Updated 4 years ago
- Time-Machine Dynamic Bulk Packet Recorder☆36Updated 3 months ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- ☆21Updated 3 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Misc. Bro scripts☆64Updated 8 years ago
- This is a copy of the Registry Decoder repository from Google Code.☆28Updated 9 years ago
- Network Block Device Server for windows with a DFIR/forensic focus.☆98Updated 8 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 6 years ago
- A python script used to parse the SAM registry hive.☆74Updated 7 years ago
- ☆85Updated 12 years ago
- Dockerized Cuckoo build☆10Updated 9 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆39Updated 8 years ago
- BSM based intrusion detection system☆39Updated 4 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Updated 9 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- (OBSOLETE) Plugins for Bro☆53Updated 7 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- DSSL library: network capture and SSL decryption toolkit☆25Updated 6 years ago