sora / mgcapLinks
A Multithread PcapNG capturing tool with Hardware timestamping
☆10Updated 8 years ago
Alternatives and similar repositories for mgcap
Users that are interested in mgcap are comparing it to the libraries listed below
Sorting:
- Lurker monitors an incoming network TCP SYN packet to invalid port number, and will respond a TCP SYN-ACK packet to collect packet payloa…☆12Updated 7 years ago
- Thread based NFVi on DPDK☆26Updated 7 years ago
- A protocol analyzer like a wireshark on CUI. cuishark is using libwireshark to analyze packets. https://cuishark.slankdev.net☆258Updated 6 years ago
- mruby running inside the bare-metal hypervisor☆19Updated 5 years ago
- This is a sample approach of data analysis in security scene.☆18Updated 7 years ago
- ソーマ・カーネル・プロジェクト☆10Updated 8 years ago
- VXLAN implementation using Linux tap interface (for my experiment)☆21Updated 12 years ago
- Past presentation materials☆10Updated 7 years ago
- go implementation of DOTS(DDoS Open Threat Signaling) https://datatracker.ietf.org/wg/dots/about/☆58Updated 6 months ago
- Internal Website for Keio Univ. Technology joint research groups☆12Updated 6 years ago
- https://github.com/sk2sat/emu のほうで一から作り直ししてます☆24Updated 8 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Updated 7 years ago
- Hayabusa: Simple and Fast Full-Text Search Engine for Massive System Log Data☆43Updated 7 years ago
- SRv6 function of multi-tenant proxy by SRH caching over AF_XDP☆22Updated 6 years ago
- Vagrantfile for playing IPv6 Segment Routing (SRv6) on Linux.☆12Updated 7 years ago
- vurp is a vulnerable reverse proxy.☆54Updated 8 years ago
- VulsRepo is visualized based on the json report output in vuls.☆184Updated 5 years ago
- AF_GRAFT: Grafting sockets from containers onto host newtork stacks☆61Updated 6 years ago
- ☆28Updated 7 years ago
- Vulnerable Web App☆13Updated 9 years ago
- Remove messages and files in a certain duration for your Slack team☆14Updated 4 years ago
- ☆38Updated 7 years ago
- A High Performance Network Stack using DPDK.☆23Updated 8 years ago
- Lepus-CTF frontend application☆11Updated 9 years ago
- Kernel debugger using Timeless Debugging method.☆74Updated 8 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- TremaによるOpenFlowプログラミング解説本☆58Updated 5 years ago
- some notes on CTFs.☆25Updated 9 years ago
- Software Design誌の連載「ハイパーバイザの作り方」の原稿公開用リポジトリ