jordan2175 / rewritecapLinks
Tool for rebasing a PCAP file and editing layer2 and layer 3 addresses
☆16Updated 4 years ago
Alternatives and similar repositories for rewritecap
Users that are interested in rewritecap are comparing it to the libraries listed below
Sorting:
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25Updated 8 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 8 months ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Updated 4 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- automatic enumeration and maintenance of Suricata monitoring interfaces☆11Updated 5 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- ☆15Updated 7 years ago
- Collect autorun records from running system☆60Updated 3 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- ☆24Updated 5 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 5 months ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆53Updated 2 months ago
- Simple streaming pre-processor and enrichment tool for structured logs.☆11Updated 2 years ago
- Rumble Network Discovery API☆17Updated last year
- Yara rules for detecting malware☆23Updated 9 months ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Flow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files☆44Updated last year
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆30Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Golang Library to interact with your MISP instance☆22Updated 5 years ago
- ☆18Updated 2 years ago