A pcap capture analysis helper
☆25Aug 30, 2023Updated 2 years ago
Alternatives and similar repositories for pcapan
Users that are interested in pcapan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- ☆16Apr 12, 2018Updated 7 years ago
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- Load a dynamic library from memory using a fuse mount☆31Sep 15, 2023Updated 2 years ago
- 👾 A command-line tool to easily run a man-in-the-middle attack leveraging ARP cache poisoning.☆13Sep 15, 2024Updated last year
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- ☆18Nov 2, 2024Updated last year
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- Swiss army knife for payload encryption and obfuscation☆28Jan 22, 2024Updated 2 years ago
- Toolchains for cross compilation and cross testing for Rust.☆23Jan 30, 2026Updated last month
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- DFIR project to collect and analyze events in Google Workspace☆13Apr 12, 2024Updated last year
- Crowdstrike response script containing various functions for IR/triage☆12Dec 7, 2020Updated 5 years ago
- 使用kcp实现的socks5正向代理☆12Dec 9, 2023Updated 2 years ago
- ☆25Jul 23, 2024Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- python wrapper to use tshark for file extraction from the command line.☆26Nov 15, 2018Updated 7 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- ☆21May 8, 2022Updated 3 years ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- GNS3 Topology Converter☆15Jan 28, 2016Updated 10 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 4 months ago
- petit programme marrant☆30Oct 12, 2025Updated 5 months ago
- 适用于目标命令执行不出网、无回显等场景☆13Oct 8, 2022Updated 3 years ago
- dockerfile that generated a static rsync binary to be used in esxi 7.0☆19Nov 7, 2023Updated 2 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- ☆23Mar 6, 2023Updated 3 years ago
- Generate backdoored RSA keys using SETUP☆235Dec 1, 2025Updated 3 months ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago