Re-implementation of the protocol reverse engineering approach FieldHunter
☆17Oct 17, 2022Updated 3 years ago
Alternatives and similar repositories for fieldhunter
Users that are interested in fieldhunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆37May 2, 2023Updated 2 years ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆57Jun 18, 2024Updated last year
- This is an industrial dataset contains eight different types of ICS protocols, mainly collected for the evaluation of protocol reverse en…☆17Jan 7, 2024Updated 2 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆182May 22, 2024Updated last year
- Peach Fuzzer 3.x☆23Apr 7, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆37Oct 25, 2024Updated last year
- ☆18Sep 2, 2025Updated 7 months ago
- Netzob: Protocol Reverse Engineering, Modeling and Fuzzing☆825Apr 18, 2024Updated last year
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 5 years ago
- Directed fuzzing framework for gVisor.☆26Oct 26, 2023Updated 2 years ago
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- ☆26Oct 3, 2023Updated 2 years ago
- Extract wav from pcap (rtp)☆14Jul 17, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A fuzzing framework targeted at MQTT brokers. Modeled as a finite state machine (using Markov Modeling).☆38Jul 11, 2023Updated 2 years ago
- Implements the algorithm form "Sparse logistic principal components analysis for binary data"☆14Dec 11, 2013Updated 12 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ☆10Jul 15, 2022Updated 3 years ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated 3 months ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- A hex/binary black box analysis tool☆13Aug 31, 2016Updated 9 years ago
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 9 years ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆38Mar 31, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Feb 15, 2020Updated 6 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Mar 4, 2024Updated 2 years ago
- Transformer-based autoregressive varitional autoencoder☆12Feb 10, 2020Updated 6 years ago
- ☆20Dec 18, 2018Updated 7 years ago
- Modbus tap/tun tunneler, for making arbitrary ethernet connections over Modbus/TCP.☆12Dec 17, 2012Updated 13 years ago
- A wireshark dissector addon for the Modbus umas Shneider protocol☆20Dec 19, 2022Updated 3 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆64Mar 1, 2017Updated 9 years ago
- DIVA: A Dirichlet Process Mixtures Based Incremental Deep Clustering Algorithm via Variational Auto-Encoder☆13Sep 18, 2023Updated 2 years ago
- AFL enhanced for concurrency bug and vulnerabilities☆19Sep 18, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- ☆10Aug 27, 2020Updated 5 years ago
- A black-box fuzzing framework for the Intent-Based Networking (IBN)☆14Aug 14, 2023Updated 2 years ago
- Tranalyzer generates extended netflow-like flow statistics from large pcap files or extensive ethernet interface measurements. It is inte…☆18Nov 14, 2018Updated 7 years ago
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆22May 29, 2023Updated 2 years ago
- This is code for “Upper Bounding Barlow Twins: A Novel Filter for Multi-relational Clustering” AAAI-24.☆12May 17, 2024Updated last year
- ☆17Sep 8, 2015Updated 10 years ago