Packet communication investigator
☆91Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for pci
Users that are interested in pci are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Visualize network topologies and collect graph statistics based on pcap files☆357Feb 17, 2023Updated 3 years ago
- internet monitoring osint telegram bot for windows☆152Apr 9, 2023Updated 3 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- a tool to make it easy and fast to test various forms of injection☆173May 2, 2019Updated 6 years ago
- This is a concept poc of command and control server implemented over blockchain☆57Aug 13, 2019Updated 6 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆431May 22, 2020Updated 5 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 5 years ago
- A Central Location For Everything You Need To Start Your Own Security Program In Your Organisation.☆24Sep 22, 2019Updated 6 years ago
- gather gather gather☆584Mar 15, 2025Updated last year
- a Device Management Daemon☆13Jan 13, 2024Updated 2 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆41Oct 19, 2020Updated 5 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Win32 utility for auditing TCP connections☆56Aug 25, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆34Aug 8, 2023Updated 2 years ago
- D-Link DCS-8600LH usage info tools☆12Jan 17, 2020Updated 6 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Sep 21, 2017Updated 8 years ago
- ☆12Oct 3, 2019Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆34Apr 1, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆34Jan 4, 2025Updated last year
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆142Apr 20, 2023Updated 2 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago