Malicious HTTP traffic explorer
☆724Mar 16, 2023Updated 2 years ago
Alternatives and similar repositories for CapTipper
Users that are interested in CapTipper are comparing it to the libraries listed below
Sorting:
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Jun 25, 2024Updated last year
- Honeypot Intelligence with Splunk☆256Oct 18, 2018Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆477Jun 16, 2023Updated 2 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Sniffs sensitive data from interface or pcap☆1,813Nov 2, 2023Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,231Aug 7, 2025Updated 6 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,083Dec 9, 2025Updated 2 months ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Automater - IP URL and MD5 OSINT Analysis☆552Aug 13, 2024Updated last year
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- Python low-interaction honeyclient☆1,021Feb 11, 2026Updated 2 weeks ago
- peinjector - MITM PE file infector☆611May 11, 2016Updated 9 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆509Jul 13, 2022Updated 3 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,346Nov 16, 2018Updated 7 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Updated this week
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,361Sep 3, 2025Updated 5 months ago
- Python Decoders for Common Remote Access Trojans☆1,116Jul 16, 2024Updated last year
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago