☆42Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for ForensicPCAP
Users that are interested in ForensicPCAP are comparing it to the libraries listed below
Sorting:
- online pcap forensic☆479Aug 3, 2017Updated 8 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- Web PCAP storage and analytics☆184Feb 15, 2023Updated 3 years ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 2 months ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- A 10Gbps UDP Reverse Proxy for Realtime Processing☆10Oct 29, 2013Updated 12 years ago
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- 恶意代码分析学习笔记☆10Dec 29, 2015Updated 10 years ago
- Obfuscate specific windows apis with different apis☆12Jul 31, 2024Updated last year
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- 基于go写的隧道代理服务器,主要用于翻墙。☆12Nov 20, 2016Updated 9 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- 网站监控☆12Nov 9, 2019Updated 6 years ago
- ☆12Apr 17, 2017Updated 8 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- recovers and reconstructs fragmented Evtx files from disk images, memory dumps, pagefiles and unallocated space☆13Feb 3, 2015Updated 11 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.☆44Apr 5, 2017Updated 8 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated 2 months ago
- Using Windows Hook to make a CLI WebShellKill☆45Feb 4, 2019Updated 7 years ago
- 面试经验记录☆14Sep 11, 2019Updated 6 years ago
- Network Forensics Bro scripts & pcap samples☆63Mar 11, 2014Updated 11 years ago
- BUGX.IO Vulnerability Review Standard☆13Mar 25, 2020Updated 5 years ago
- Heartbleed test script for OpenVPN☆34Apr 10, 2014Updated 11 years ago
- 大网段端口开放扫描器☆14May 21, 2019Updated 6 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 2 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- LANGZI_SRC_安全巡航 是一款集成漏扫,验证,资产监控,自动复现并且生成结果表报的工具,实现初衷是为了帮助白帽子在SRC中节约时间成本的自动化工具。☆14Jul 7, 2019Updated 6 years ago
- 恶意软件分析套件☆18Jun 27, 2017Updated 8 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Advanced Malware Analysis [video], published by Packt☆22Jan 24, 2023Updated 3 years ago