A collection of pcaps
☆16Jul 5, 2015Updated 10 years ago
Alternatives and similar repositories for pcaps
Users that are interested in pcaps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Jun 14, 2020Updated 5 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- The Network File Extractor☆11Feb 27, 2014Updated 12 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Nov 11, 2025Updated 4 months ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- Python Script For Packet Sniffing☆11Aug 19, 2020Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆15May 29, 2020Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- not the worst forensics regexp—this is not the primary repo; caveat programmer☆30May 7, 2019Updated 6 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- PyGotham 2017: Spark Streaming for World Domination (and other projects)☆10Oct 5, 2017Updated 8 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Feb 23, 2015Updated 11 years ago
- Docker image to maintain a Linode Nodebalancer SSL key☆13Mar 3, 2021Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆10Jun 13, 2018Updated 7 years ago
- Collection of Utility scripts☆16Sep 11, 2019Updated 6 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- A boundle of useful scripts☆18Apr 26, 2025Updated 10 months ago
- Hack South is a South Africa-based community for infosec professionals, security researchers, and students sharing insights, advice, and …☆14Nov 16, 2024Updated last year
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Jul 26, 2021Updated 4 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago