CapAnalysis source code repository
☆89Dec 26, 2018Updated 7 years ago
Alternatives and similar repositories for CapAnalysis
Users that are interested in CapAnalysis are comparing it to the libraries listed below
Sorting:
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- github信息泄露搜集工具。GSIL升级版,去除发邮件方式,将结果保存在本地☆13Mar 20, 2021Updated 4 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Jan 6, 2019Updated 7 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- ☆53May 21, 2018Updated 7 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Indexed search and clustering tool for digital forensics☆26Nov 5, 2014Updated 11 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 8 months ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Aug 30, 2022Updated 3 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- ☆13Sep 25, 2019Updated 6 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- Encase Script to parse harddrive for MFT data☆16Jun 17, 2016Updated 9 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Free KeyLogger for Kali Linux and Ubuntu☆37Feb 21, 2016Updated 10 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Jul 14, 2017Updated 8 years ago
- ThinkPHP vulnerability scan for BurpSuite☆15Nov 18, 2019Updated 6 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- ☆14Jan 14, 2026Updated last month