fireeye / RProxyLinks
☆110Updated 11 years ago
Alternatives and similar repositories for RProxy
Users that are interested in RProxy are comparing it to the libraries listed below
Sorting:
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Updated 3 years ago
- BSM based intrusion detection system☆39Updated 4 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Updated 10 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- YAPDNS☆39Updated 10 years ago
- Network Block Device Server for windows with a DFIR/forensic focus.☆98Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 11 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Parser of X.509 certificates☆44Updated 9 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- This is a copy of the Registry Decoder repository from Google Code.☆28Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Python bindings to libhtp☆30Updated 4 years ago
- DSSL library: network capture and SSL decryption toolkit☆25Updated 5 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆39Updated 8 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆54Updated 10 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Updated 7 years ago
- DEPRECATED - replaced with "monitor"☆121Updated 9 years ago
- A collection of shellcodes☆69Updated 13 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago