Packet communication investigator
☆91Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for pci
Users that are interested in pci are comparing it to the libraries listed below
Sorting:
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆357Feb 17, 2023Updated 3 years ago
- internet monitoring osint telegram bot for windows☆152Apr 9, 2023Updated 2 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Dec 16, 2016Updated 9 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- a tool to make it easy and fast to test various forms of injection☆174May 2, 2019Updated 6 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 8 months ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆431May 22, 2020Updated 5 years ago
- Client-side collector for the Android Census☆16Mar 17, 2024Updated 2 years ago
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 5 years ago
- A Central Location For Everything You Need To Start Your Own Security Program In Your Organisation.☆24Sep 22, 2019Updated 6 years ago
- Immediate Virus Infection Counter Measures☆63Apr 13, 2021Updated 4 years ago
- a Device Management Daemon☆13Jan 13, 2024Updated 2 years ago
- gather gather gather☆583Mar 15, 2025Updated last year
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- D-Link DCS-8600LH usage info tools☆12Jan 17, 2020Updated 6 years ago
- ☆34Aug 8, 2023Updated 2 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Sep 21, 2017Updated 8 years ago
- ☆11Oct 3, 2019Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆34Apr 1, 2018Updated 7 years ago
- Zeek S7comm, S7comm-plus, and COTP Parser - CISA ICSNPP☆29Mar 3, 2026Updated 2 weeks ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Aug 22, 2018Updated 7 years ago
- Repository of tools used in my blog☆52Mar 22, 2024Updated last year
- Network Analysis Tool☆3,338Apr 10, 2023Updated 2 years ago