paresh2806 / PCAP-AnalyzerLinks
Network Protocol Analyzer & Deshboard (Cyber Security)
☆38Updated last year
Alternatives and similar repositories for PCAP-Analyzer
Users that are interested in PCAP-Analyzer are comparing it to the libraries listed below
Sorting:
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆60Updated last year
- Argus Sensor☆74Updated last week
- ☆71Updated 7 years ago
- Collection of Snort 2/3 rules.☆40Updated 7 years ago
- Interactive, dynamic, and realistic LLM honeypots☆71Updated 11 months ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆236Updated 2 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆247Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- A curated list of awesome things related to Suricata☆219Updated 2 months ago
- AI-powered security operations with Wazuh SIEM + Claude Desktop. Natural language threat detection, automated incident response & compli…☆116Updated 2 weeks ago
- Public datasets to help you address various cyber security problems.☆463Updated 3 years ago
- A list of attacks or malware using steganography or information hiding☆70Updated last month
- MCP Server for Wazuh SIEM☆169Updated last month
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆47Updated last month
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆116Updated 4 months ago
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆857Updated this week
- IOCs from zLabs research☆36Updated last week
- This repository contains usage documentation for the Python module PyShark. It also provides various Python methods for processing, filt…☆47Updated last year
- packet captures of real-world ddos attacks☆167Updated 3 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- Unit 42 repository hosting packet captures (pcaps) for our series of Wireshark tutorials☆47Updated 2 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆67Updated 6 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆42Updated 5 years ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆69Updated 2 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆206Updated 2 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66Updated last year
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆267Updated this week
- An environment for testing AI pentesting agents against a simulated network.☆204Updated last year
- ChatGPT for Cybersecurity Cookbook, published by Packt☆160Updated last month