rapid7 / resynthLinks
A network packet synthesis language
β20Updated 3 months ago
Alternatives and similar repositories for resynth
Users that are interested in resynth are comparing it to the libraries listed below
Sorting:
- π§ Currently transfering TLP:CLEAR rules from TLP:AMBER repository...β21Updated last year
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.β18Updated 3 years ago
- Windows eventlog formatting, live fetching and querying utility in Cβ20Updated 5 years ago
- WhiteBeam: Transparent endpoint securityβ101Updated 2 years ago
- Rust bindings for VirusTotal/Yaraβ78Updated 6 months ago
- eBPF-based EDR for Linuxβ18Updated last year
- YARI is an interactive debugger for YARA Language.β88Updated 2 months ago
- A document tagging libraryβ30Updated 5 months ago
- π΅οΈββοΈ Find, locate, and query files for ops and security experts β‘οΈβ‘οΈβ‘οΈβ34Updated 2 years ago
- Threat hunting with Sysmon and ArangoDB Graphsβ11Updated 5 years ago
- Linux rust keyloggerβ17Updated last year
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commuβ¦β17Updated 2 years ago
- Forensic framework to build tools that can be reused in multiple projects without changing anythingβ28Updated 5 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hostβ¦β124Updated last week
- this repo is for red team process and tools collectionβ25Updated 4 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linuxβ59Updated 3 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.β23Updated last year
- A forensic evidence acquirerβ86Updated 4 years ago
- File Capability Extractorβ13Updated last month
- Provides a multi-platform Graphical User Interface for hashlookupβ12Updated last year
- Suricata rule and intel indexβ31Updated last month
- This tool have the power to hide any PID/directory in the Linux kernelβ29Updated 11 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosureβ38Updated 7 months ago
- Application for detecting command and control (C2) communication through network traffic analysis.β14Updated 2 years ago
- β19Updated last year
- Pure python parser for Snort/Suricata rules.β33Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.β77Updated 2 years ago
- Understanding the operation and limitations of Sysmon's eventsβ19Updated 2 years ago
- Shared library loading application for Linux written in Go.β17Updated 5 years ago
- A CALDERA pluginβ69Updated this week