Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters
☆11May 10, 2025Updated 9 months ago
Alternatives and similar repositories for packet-monkey
Users that are interested in packet-monkey are comparing it to the libraries listed below
Sorting:
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 8 months ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆21Nov 26, 2025Updated 3 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated last month
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- Menentukan Harga Rumah dan Harga Tanah menggunakan metode Fuzzy Tsukamoto☆10Mar 21, 2017Updated 8 years ago
- ☆24Jan 31, 2024Updated 2 years ago
- E-Learning untuk Sekolah☆13Aug 14, 2025Updated 6 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- traefik stack for balenaCloud to proxy https domains to internal services☆11Oct 3, 2020Updated 5 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- Reflections on must know topics in software engineering☆11Jul 20, 2025Updated 7 months ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Aug 25, 2018Updated 7 years ago
- ☆11Apr 16, 2025Updated 10 months ago
- Display USGS Watershed maps on a Node-RED Dashboard with Water Quality Reports☆11Jun 9, 2020Updated 5 years ago
- This is a powershell module to help implement the AD Tier Model☆14Feb 17, 2026Updated last week
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Sample auto deploy an application combining Jenkins with Terraform and Ansible☆12Apr 17, 2022Updated 3 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Project Template for IHP. Used by ihp-new. License: MIT☆11Jan 22, 2026Updated last month
- A simple example using ESP-Now on the ESP32 with Arduino☆12Mar 16, 2019Updated 6 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- VPN & IP Changer☆10Aug 6, 2024Updated last year
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year