paulveillard / cybersecurity-pcap-toolsLinks
A collection of awesome software, libraries, documents, books, resources and cool stuff about cybersecurity packet capture (PCAP) tools.
☆26Updated 3 years ago
Alternatives and similar repositories for cybersecurity-pcap-tools
Users that are interested in cybersecurity-pcap-tools are comparing it to the libraries listed below
Sorting:
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆45Updated this week
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- Bypass Cisco Umbrella DNS Proxy Firewall Restrictions☆53Updated last year
- tshark + ELK analytics virtual machine☆69Updated 6 months ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆96Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆46Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆99Updated last year
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- ☆19Updated 3 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated 4 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆50Updated last year
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆39Updated last year
- A tool designed to analyse email headers☆35Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- VoIPShark is a open source VoIP Analysis Platform which will allow people to analyze live or stored VoIP traffic, easily decrypt encrypte…☆86Updated 5 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated last year
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆72Updated last month
- Honeyscanner: A vulnerability analyzer for honeypots☆46Updated 11 months ago
- A database for storing, querying and doing stats on credential leaks☆40Updated 2 years ago
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆170Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand …☆90Updated last year