madpowah / ForensicPCAPLinks
☆42Updated 3 years ago
Alternatives and similar repositories for ForensicPCAP
Users that are interested in ForensicPCAP are comparing it to the libraries listed below
Sorting:
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆51Updated 8 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated 2 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Updated 9 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 12 years ago
- ☆79Updated 3 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆113Updated 5 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆43Updated 11 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- Source Code Intelligence☆30Updated 8 years ago
- ☆86Updated 8 years ago
- ☆83Updated 8 years ago
- Snort rules☆35Updated 7 years ago
- DockerFiles for Docker Containers☆16Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 8 years ago
- Juniper backdoor☆14Updated 9 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 11 years ago
- Vulners signature-base software version detection rules☆38Updated 4 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- A curated list of rootkits found on Github and other sites.☆65Updated 8 years ago
- ☆37Updated 10 years ago
- LFI scan, exploit tool☆13Updated 11 years ago
- Subdomain Analyzer☆77Updated 8 years ago
- Simple, useful scripts for red/blue team situations☆22Updated 10 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆98Updated 11 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆54Updated 10 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago