nbareil / net2pcap
Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments
☆39Updated 11 years ago
Alternatives and similar repositories for net2pcap:
Users that are interested in net2pcap are comparing it to the libraries listed below
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 7 years ago
- intel amt honeypot☆18Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- See here:☆42Updated 12 years ago
- ☆15Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- ☆16Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- A collection of Volatility Framework plugins.☆26Updated 11 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- API functions for Malware Research☆35Updated 5 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Diaphora, a Free and Open Source program diffing tool☆23Updated 5 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- Passive DHCP fingerprinting implementation☆51Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, can also remove IEEE 802.1Q (virtual lan) header. Works w…☆32Updated 6 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago