python wrapper to use tshark for file extraction from the command line.
☆26Nov 15, 2018Updated 7 years ago
Alternatives and similar repositories for tshark_extractor
Users that are interested in tshark_extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Oct 28, 2018Updated 7 years ago
- Android attempt at PoC CVE-2016-8655☆13Jul 1, 2017Updated 8 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- ☆16Apr 12, 2018Updated 7 years ago
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- Generates network traffic summaries.☆23Dec 9, 2025Updated 3 months ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- GNS3 Topology Converter☆15Jan 28, 2016Updated 10 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11May 11, 2024Updated last year
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Quick module to deploy a Linux VM to Azure with Ansible installed at bootup - by @JesseLoudon☆11Dec 9, 2025Updated 3 months ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆38Mar 25, 2024Updated 2 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- Python wrapper extension for C Whirlpool digest reference implementation.☆20Dec 30, 2023Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 15, 2024Updated 2 years ago
- Connectors for the Zeek NetControl framework☆19Feb 4, 2025Updated last year
- ☆33Oct 25, 2021Updated 4 years ago
- Snake game written in PowerShell which uses any windows console (cmd.exe, powershell.exe, even VSCode) and draws out a custom native code…☆14Mar 25, 2025Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 5 months ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- ☆24Apr 22, 2025Updated 11 months ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- Read the Master Boot Record using Python☆11Oct 2, 2015Updated 10 years ago