A network packet synthesis language
☆23Mar 5, 2026Updated 2 weeks ago
Alternatives and similar repositories for resynth
Users that are interested in resynth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Nov 26, 2025Updated 3 months ago
- ☆17Mar 13, 2026Updated last week
- Structure aware fuzzing for network traffic packet captures☆13Nov 18, 2025Updated 4 months ago
- A tools to work on suricata stats.log file.☆30Oct 14, 2015Updated 10 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Red TL;DR Database is a set of text data that provides search for red-tldr. If you don’t know red-tldr yet, please read the documentation…☆41Sep 2, 2022Updated 3 years ago
- A very simple way to try Suricata and EveBox☆15Feb 17, 2025Updated last year
- A Yosys pass and technology library + scripts for implementing a HDL design in discretie FETs for layout in KiCad☆14Jan 15, 2024Updated 2 years ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆22Apr 21, 2025Updated 11 months ago
- BlowBeef is a tool for analyzing WMI data.☆18Jul 26, 2021Updated 4 years ago
- An HTTP client specifically developed for security researchers☆28Mar 2, 2026Updated 3 weeks ago
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- The Security Analyst’s Guide to Suricata☆61Apr 28, 2025Updated 10 months ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- Benchmark of toy calculation on an n-dimensional array using python, numba, cython, pythran and rust☆26Nov 11, 2021Updated 4 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- ☆10Dec 28, 2015Updated 10 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- ☆10Apr 13, 2021Updated 4 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆63Jul 10, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆11Jul 5, 2023Updated 2 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- ☆11Nov 17, 2025Updated 4 months ago
- docker compose outline☆11Apr 22, 2023Updated 2 years ago
- A Go(lang) IDS rule parser☆13Jun 10, 2019Updated 6 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- ☆36Mar 4, 2025Updated last year
- Reddit community versions of Cain's Jawbone☆23Nov 13, 2023Updated 2 years ago
- Scanner for CVE-2022-22948 an Information Disclosure in VMWare vCenter☆12May 9, 2023Updated 2 years ago
- Go eBPF Library☆12Jul 9, 2016Updated 9 years ago
- BER/DER parser written in pure Rust. Fast, zero-copy, safe.☆96Nov 24, 2025Updated 3 months ago