Packet communication investigator
☆91Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for pci
Users that are interested in pci are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Visualize network topologies and collect graph statistics based on pcap files☆359Feb 17, 2023Updated 3 years ago
- internet monitoring osint telegram bot for windows☆152Apr 9, 2023Updated 3 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Dec 16, 2016Updated 9 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 6 years ago
- a tool to make it easy and fast to test various forms of injection☆172May 2, 2019Updated 7 years ago
- This is a concept poc of command and control server implemented over blockchain☆58Aug 13, 2019Updated 6 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆430May 22, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Client-side collector for the Android Census☆16Mar 17, 2024Updated 2 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 5 years ago
- Immediate Virus Infection Counter Measures☆63Apr 13, 2021Updated 5 years ago
- a Device Management Daemon☆13Jan 13, 2024Updated 2 years ago
- gather gather gather☆587Mar 15, 2025Updated last year
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆107Jul 26, 2024Updated last year
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Win32 utility for auditing TCP connections☆56Aug 25, 2020Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- ☆34Aug 8, 2023Updated 2 years ago
- D-Link DCS-8600LH usage info tools☆12Jan 17, 2020Updated 6 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Sep 21, 2017Updated 8 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some of the vulnerabilities that were found by Cybellum platform☆34Apr 1, 2018Updated 8 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Zeek S7comm, S7comm-plus, and COTP Parser - CISA ICSNPP☆29Mar 3, 2026Updated 2 months ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆143Apr 20, 2023Updated 3 years ago