paulveillard / cybersecurity-pcap-toolsLinks
A collection of awesome software, libraries, documents, books, resources and cool stuff about cybersecurity packet capture (PCAP) tools.
☆27Updated 3 years ago
Alternatives and similar repositories for cybersecurity-pcap-tools
Users that are interested in cybersecurity-pcap-tools are comparing it to the libraries listed below
Sorting:
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆46Updated this week
- ☆19Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Updated 2 years ago
- Incident Response - Fast suspicious file finder☆244Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 9 months ago
- tshark + ELK analytics virtual machine☆69Updated 7 months ago
- ☆80Updated 2 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆15Updated last year
- Open platform for sharing malware distribution sites☆55Updated 10 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- ADDS (Active Directory Domain Services)☆28Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- CSI SIEM☆110Updated 2 years ago
- Ransomware groups posts☆42Updated this week
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆198Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆29Updated last year
- Simple Malware Scanner written in python☆92Updated 4 months ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆21Updated 3 weeks ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated 3 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23Updated last year
- URL fingerprinting made easy☆89Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year