synacktiv / pcapanLinks
A pcap capture analysis helper
☆25Updated 2 years ago
Alternatives and similar repositories for pcapan
Users that are interested in pcapan are comparing it to the libraries listed below
Sorting:
- Identifies metadata of .NET binary files.☆21Updated last year
- ☆12Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- ☆18Updated last year
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13Updated 8 months ago
- ☆49Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Updated 2 years ago
- ☆18Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- single-threaded event driven sleep obfuscation poc for linux☆37Updated 7 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- ☆27Updated last year
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆34Updated last month
- x64 Windows package of the shellcode2exe tool☆14Updated 5 years ago
- some sploits☆19Updated last year
- ☆31Updated 3 years ago
- A collection of my presentation materials.☆17Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Updated last week
- Leverages B64 chunks to split files and save to clipboard☆26Updated 2 months ago
- Tool for obtaining information about PPL processes☆16Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- ☆38Updated 2 years ago