A FUSE module to mount captured network data
☆42Jun 20, 2025Updated 9 months ago
Alternatives and similar repositories for pcapFS
Users that are interested in pcapFS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Dec 27, 2025Updated 3 months ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆98Jan 13, 2026Updated 3 months ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- A Delphi symbol name recovery tool for reverse engineers.☆24Jan 17, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 4 months ago
- Approximate matching using Hierarchical Bloom Filter Trees. Based on mrsh-v2.☆14Feb 20, 2021Updated 5 years ago
- Messing around with clamav sigs☆27Aug 3, 2020Updated 5 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆263Mar 27, 2023Updated 3 years ago
- GeMU, the generic malware unpacker based on QEMU☆25Mar 16, 2026Updated last month
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Sends public ip through e-mail. Command-line standalone.☆12Sep 22, 2017Updated 8 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆180Apr 9, 2026Updated last week
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- ☆32Jan 24, 2016Updated 10 years ago
- Identify web application versions☆18Apr 14, 2017Updated 9 years ago
- A mapping of used malware names to commonly known family names☆63Feb 21, 2023Updated 3 years ago
- Leitfaden Software-Architektur☆14Sep 7, 2019Updated 6 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Slides from my PhD thesis defense at MIT CSAIL, October 2018☆10Mar 4, 2019Updated 7 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated 3 weeks ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/windbgshark☆12Nov 3, 2015Updated 10 years ago
- GoLang binary pclntab mangler☆14Mar 2, 2020Updated 6 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 10 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago