CapTipper is a python tool to analyze, explore, and revive HTTP malicious traffic. It sets up a web server that acts as the server in the PCAP file, providing an interactive console for analysis of hosts, objects, and conversations. CapTipper aids security researchers in understanding network flow, researching exploits, versions, obfuscations, and shellcodes by allowing easy access to files and network data.
FEATURES
SIMILAR TOOLS
Network Dump data Displayer and Editor framework for tcpdump trace files manipulation.
DOS attack by sending fake BPDUs to disrupt switches' STP engines.
A Zeek-based protocol analyzer that parses GQUIC traffic to extract connection metadata and create fingerprints for detecting anomalous network behavior.
A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts
Tool used to scan a range of IP addresses to identify active hosts and gather information about them.
A repository of pre-defined detections for security threats and abnormal behaviors in Falco.
Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.