parsiya / extract-sniLinks
Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients using HTTPs.
☆12Updated 5 years ago
Alternatives and similar repositories for extract-sni
Users that are interested in extract-sni are comparing it to the libraries listed below
Sorting:
- automatic enumeration and maintenance of Suricata monitoring interfaces☆11Updated 5 years ago
- eBPF-based EDR for Linux☆18Updated 10 months ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Backdoor detection for VMware view☆13Updated 3 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆14Updated 6 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23Updated 9 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 3 years ago
- ☆18Updated 4 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Provides access to libhashcat☆30Updated last year
- A Passive DNS backend and collector☆31Updated 3 years ago
- Monitor malware scanning services for your payloads☆11Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- E4's C2 server☆20Updated 4 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Simple packet dissector that detects anomalous DNP3 traffic by analysing its parameters☆15Updated 9 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 3 months ago