A Multithread PcapNG capturing tool with Hardware timestamping
☆10Nov 6, 2016Updated 9 years ago
Alternatives and similar repositories for mgcap
Users that are interested in mgcap are comparing it to the libraries listed below
Sorting:
- transparent proxy☆10Nov 1, 2017Updated 8 years ago
- ☆11Mar 12, 2025Updated last year
- Hayabusa: Simple and Fast Full-Text Search Engine for Massive System Log Data☆42Oct 15, 2018Updated 7 years ago
- Internal Website for Keio Univ. Technology joint research groups☆13Oct 25, 2018Updated 7 years ago
- Simple implementation of NVMe Linux usermode driver☆22Feb 1, 2018Updated 8 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- A SIMD intrinsics library for the Raspberry Pi's Broadcom VideoCore IV GPU☆13May 9, 2016Updated 9 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- CR0.CD manipulate Linux Kernel Module as a proc filesystem☆19Jul 29, 2019Updated 6 years ago
- ☆18May 16, 2022Updated 3 years ago
- Sample Program for rust-uefi. It's running as a UEFI apps written by Rust.☆16Sep 14, 2019Updated 6 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- Portable log aggregation tool for middle-scale system operation/troubleshooting.☆35Nov 20, 2025Updated 4 months ago
- An implementation of minimal perfect hash function☆19Dec 23, 2010Updated 15 years ago
- Analysis related to article on FOIA Online Database.☆11Feb 2, 2017Updated 9 years ago
- ☆38Apr 29, 2018Updated 7 years ago
- Vagrant files for a Ganeti tutorial and/or Ganeti testing environment☆28Feb 28, 2014Updated 12 years ago
- Ruby で書かれた Tuple-at-a-time 方式のクエリエクスキューター☆12Dec 24, 2020Updated 5 years ago
- Ansible role to manage omdistro and check_mk☆10Jun 30, 2017Updated 8 years ago
- Streaming loader for Amazon Redshift Spectrum☆10May 21, 2025Updated 10 months ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Layer 2, 3, 4 protocol decoding and encoding for Go☆17Feb 3, 2016Updated 10 years ago
- R Shiny App created to predict the success rate of Freedom of Information Act requests.☆16Dec 11, 2017Updated 8 years ago
- Small, fast, header only, zero dependency cryptographic library.☆25Aug 3, 2023Updated 2 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- Load a MySQL dump file using LOAD DATA INFILE☆15May 7, 2020Updated 5 years ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 6 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 7 months ago
- Bro Snippets☆21Nov 7, 2014Updated 11 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- A static site generator specialized for blogging and designed for rabbits. Not for human.☆13Jun 23, 2019Updated 6 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Makefiles and patches for compiling Bro IDS with OpenWRT Buildroot☆10Apr 18, 2016Updated 9 years ago
- gdbserver implementation on BitVisor☆25Nov 8, 2017Updated 8 years ago
- TCP to UDP proxy☆11Oct 17, 2017Updated 8 years ago
- a plugin based grpc framework☆16May 3, 2019Updated 6 years ago