thongsia / Public-PcapsView external linksLinks
☆71Oct 30, 2018Updated 7 years ago
Alternatives and similar repositories for Public-Pcaps
Users that are interested in Public-Pcaps are comparing it to the libraries listed below
Sorting:
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- ☆18May 27, 2025Updated 8 months ago
- ☆11Oct 7, 2023Updated 2 years ago
- ☆82Apr 9, 2021Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Jul 29, 2021Updated 4 years ago
- Script to chain search parameters for MalwareBazaar☆12Jan 26, 2025Updated last year
- Public Repository of all Publicly Available Packet Captures that I've used or come across☆182Jan 17, 2013Updated 13 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- Training scenarios for cyber ranges☆14Apr 24, 2020Updated 5 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 2 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Share your Yara rules with VirusTotal☆27Aug 12, 2024Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Jun 11, 2019Updated 6 years ago
- A collection of ICS/SCADA PCAPs☆534Jan 3, 2020Updated 6 years ago
- A security tool designed to perform thorough scans on a target using OpenVAS, Zap, and Nexpose. It seamlessly consolidates and integrates…☆46Updated this week
- Detecting Tor Traffic using Deep Learning Techniques☆23Jul 27, 2020Updated 5 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆19Aug 8, 2018Updated 7 years ago
- ☆55Jan 7, 2024Updated 2 years ago
- ☆27Nov 7, 2023Updated 2 years ago
- Simple golang shodan cli☆49Apr 1, 2021Updated 4 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆64Jul 10, 2023Updated 2 years ago
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 7 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- ☆36Jun 10, 2024Updated last year
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- machofile is a module to parse Mach-O binary files☆91Updated this week
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Dec 11, 2024Updated last year
- ☆28Aug 2, 2023Updated 2 years ago