vishal1991 / Network-Forensics
• Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.
☆12Updated 10 years ago
Alternatives and similar repositories for Network-Forensics
Users that are interested in Network-Forensics are comparing it to the libraries listed below
Sorting:
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Passive DNS V2☆60Updated 11 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 9 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Top DNS Measurement for Bro☆11Updated 4 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Updated 11 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 7 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- ☆18Updated 6 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- malware-traffic-analysis.net PCAPs repository.☆35Updated 8 years ago
- Gather and compile open source threat intelligence feeds.☆39Updated 3 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)☆19Updated 9 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆32Updated 7 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Automatic attack detector and botnet classifier☆28Updated 8 years ago