Analyze pcaps with Zeek and a Grafana Dashboard
☆191May 24, 2024Updated last year
Alternatives and similar repositories for pcap-did-what
Users that are interested in pcap-did-what are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nmap Dashboard Mini Project☆630Jun 12, 2024Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- eBPF hacks☆197Dec 12, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆132Jun 1, 2024Updated last year
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆113Jan 4, 2024Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Mar 18, 2026Updated last week
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- ☆307Mar 15, 2025Updated last year
- Explore a website's internal links, then visualize and interact with those connections as a network graph with scorecards and analysis us…☆86Mar 11, 2026Updated 2 weeks ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Apr 27, 2025Updated 10 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Dec 29, 2024Updated last year
- Live Feed of C2 servers, tools, and botnets☆756Mar 16, 2026Updated last week
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Nov 12, 2023Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- ☆16Oct 18, 2024Updated last year
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆220Jun 4, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- ☆569Mar 28, 2024Updated last year
- ☆319Jul 6, 2022Updated 3 years ago
- ☆18Jun 25, 2024Updated last year
- OT security monitoring #nsacyber☆615Jan 7, 2024Updated 2 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆211Nov 14, 2025Updated 4 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,417Jan 19, 2026Updated 2 months ago
- An Ansible role that runs Vulhub environments on a Linux system.☆21Oct 15, 2025Updated 5 months ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆324May 1, 2025Updated 10 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 9 months ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago