michoo / pci
Packet communication investigator
☆90Updated 2 years ago
Alternatives and similar repositories for pci:
Users that are interested in pci are comparing it to the libraries listed below
- No-Script Automation Tool☆56Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 2 months ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 6 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- ☆50Updated 6 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆66Updated 2 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- Rogue AP killer☆89Updated 6 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated last year
- Stop searching for sample hashes on 10 different sites.☆65Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆67Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Mass static malware analysis tool☆95Updated 2 years ago
- Automatically exported from code.google.com/p/nipper-ng☆68Updated 2 years ago
- A RADIUS authentication server audit tool☆79Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- A collection of infosec related scripts and information.☆53Updated 3 months ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆19Updated 2 years ago
- Security Onion Elastic Stack☆46Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- An extensible honeypot framework☆93Updated 2 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 3 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆161Updated 4 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago