Deep Packet Inspection • Traffic Forensics • Network Threat Detection
☆50Feb 20, 2026Updated last month
Alternatives and similar repositories for packet-capture-analyzer
Users that are interested in packet-capture-analyzer are comparing it to the libraries listed below
Sorting:
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- ☆13Aug 1, 2023Updated 2 years ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 3 months ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 6 months ago
- ☆13Feb 23, 2025Updated last year
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Feb 2, 2026Updated last month
- ☆16Dec 4, 2023Updated 2 years ago
- PowerShell-based Windows Server Security Audit Engine by Cyb3rint3l Labs. Measures alignment with the NIS2 directive and maps findings to…☆42Feb 1, 2026Updated last month
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- TailorTech is a SaaS platform leverages the latest technologies including Next.js 14, Bun, Stripe Connect, Prisma, MySQL, and Tailwind to…☆15Oct 22, 2024Updated last year
- ☆15Mar 12, 2025Updated last year
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 5 months ago
- Rubber Ducky powered by NeoKey☆29Jun 3, 2024Updated last year
- ☆63Feb 24, 2026Updated 3 weeks ago
- DFIR Timeline Analysis for macOS — SQLite-backed viewer for CSV, TSV, XLSX, EVTX, Plaso, $MFT, and $J files with built-in process inspect…☆213Updated this week
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- A C# client side library for interfacing with the OSIsoft PI WebAPI☆10Mar 10, 2019Updated 7 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 2 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated 2 years ago
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows☆14Jan 31, 2025Updated last year
- InvisibleJS: A CLI tool to convert JavaScript into an invisible, executable payload using Zero-Width encoding.☆62Jan 19, 2026Updated 2 months ago
- ☆12Mar 14, 2022Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Nextjs landing home page for a business with Theme UI. Layout is 100% responsive on any screen. This is the best home page that I have bu…☆12May 10, 2021Updated 4 years ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆29Feb 6, 2026Updated last month
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆72Updated this week
- Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088☆55Aug 18, 2025Updated 7 months ago
- This project will guide yout to awareness of injection in almost every window API and process.☆24Mar 30, 2022Updated 3 years ago
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year