☆11Jun 18, 2020Updated 5 years ago
Alternatives and similar repositories for pcapquiz
Users that are interested in pcapquiz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bro stuff.☆12May 24, 2016Updated 9 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- Get the iTerm2 version☆11Jan 5, 2026Updated 2 months ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Pure Go implementation of OpenSSL dhparam generator☆16Sep 20, 2024Updated last year
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆69Aug 7, 2020Updated 5 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- scoreserver web application for CTF(Capture The Flag)☆24Aug 3, 2022Updated 3 years ago
- A list of collected articles and resources from the website Peerlyst☆17Dec 14, 2016Updated 9 years ago
- Neural networks for Excel☆13Jun 22, 2022Updated 3 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- CyberChef update scripts in PowerShell & Bash☆18Apr 22, 2024Updated last year
- Saturate the bad guys' databases.☆14Jan 19, 2024Updated 2 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- ☆17Mar 13, 2026Updated last week
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Utilities and scripts for bro-ids☆23Jan 6, 2014Updated 12 years ago
- CTF System that allows many things(^_^), used in HackMETU'15, HackMETU'16 and many private contests☆12Feb 20, 2015Updated 11 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago
- Any code for preparing for OSCE☆12Oct 31, 2017Updated 8 years ago
- Defcoin source tree☆13Apr 15, 2021Updated 4 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- This is the code for the "How to Make an Asteroids Game Bot" live session by Siraj Raval on Youtube☆17Dec 29, 2016Updated 9 years ago
- 区块链小白书☆14Dec 4, 2019Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- PHP and MYSQL code to build Web-based Virtual Stock Market played in Mumbai Univeristy, India☆16Jan 5, 2015Updated 11 years ago
- Vulnerability Environment Build with Dockerfile -> Docker Hub☆20May 16, 2025Updated 10 months ago
- Just enough to get process supervision and startup mechanisms☆37Feb 3, 2023Updated 3 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- Duo two-factor authentication for Confluence.☆14Jul 18, 2022Updated 3 years ago