synacktiv / pcapanLinks
A pcap capture analysis helper
☆25Updated 2 years ago
Alternatives and similar repositories for pcapan
Users that are interested in pcapan are comparing it to the libraries listed below
Sorting:
- ☆12Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 2 years ago
- ☆18Updated 9 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13Updated 4 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- ☆26Updated last year
- ☆63Updated last year
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆33Updated this week
- ☆37Updated 3 years ago
- ☆47Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- some sploits☆18Updated last year
- ☆18Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆27Updated 10 months ago
- ☆17Updated 2 years ago
- ☆24Updated 8 months ago
- single-threaded event driven sleep obfuscation poc for linux☆34Updated 4 months ago
- ☆31Updated 3 years ago
- OSED Practice binary☆24Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago