An improved algorithm for large scale OS fingerprinting
☆19Jun 12, 2018Updated 7 years ago
Alternatives and similar repositories for hershelplus
Users that are interested in hershelplus are comparing it to the libraries listed below
Sorting:
- JA4TScan is an active TCP server fingerprinting tool.☆104Aug 29, 2024Updated last year
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- ROSE-T: ROuting SEcurity Tool☆17Nov 9, 2024Updated last year
- Parse NMEA sentences and other typical output from GNSS devices.☆18Jan 14, 2026Updated last month
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Source code for IMC replicability track☆16Oct 4, 2024Updated last year
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆40Sep 2, 2025Updated 6 months ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 8 months ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- goscanner is a tool for large-scale TLS and SSH scans☆33Jan 7, 2026Updated last month
- SecuritySnack data that doesn't fit into a single tweet.☆44Dec 22, 2025Updated 2 months ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆77Feb 7, 2023Updated 3 years ago
- Multi-protocol exchange broker for IoT within the 5G-and-Beyond networks, and primary emphasis on scalability.☆12Jan 29, 2024Updated 2 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated 2 weeks ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Universal/Uniform Backup Tool☆13Updated this week
- ☆22Aug 29, 2025Updated 6 months ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- speeds up your Rust program's execution by "priming" memory pages from your binary☆13Aug 22, 2024Updated last year
- Sweetcher: For those who know the hell of enterprise proxies☆16Sep 6, 2024Updated last year
- Image Encryption Using Arnold Cat Map, Logistic Map, and Selective Technique.☆10Jul 6, 2018Updated 7 years ago
- Java Wrapper for Intel's librdrand Library.☆10Apr 24, 2017Updated 8 years ago
- ☆11May 17, 2023Updated 2 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 3 months ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- Collection of patches for nginx to run it as a Nanos unikernel☆11Sep 21, 2023Updated 2 years ago