netsniff-ng
Kaitai Struct
netsniff-ng | Kaitai Struct | |
---|---|---|
2 | 44 | |
1,177 | 3,839 | |
2.3% | 1.1% | |
0.0 | 7.5 | |
over 1 year ago | 21 days ago | |
C | Shell | |
GNU General Public License v3.0 or later | GPL-3.0-or-later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
netsniff-ng
-
What is the correct way to do a git pull, ./configure, make, make install within a dockerfile?
RUN apt-get update && \ apt-get install -y iproute2 iputils-ping iperf3 tcpdump netcat ethtool \ mtr iftop nmap python3 python3-pip joe nano ccache flex bison libnl-3-dev \ libnl-genl-3-dev libnl-route-3-dev libgeoip-dev libnetfilter-conntrack-dev \ libncurses5-dev liburcu-dev libnacl-dev libpcap-dev zlib1g-dev libcli-dev \ libnet1-dev git RUN pip3 install ncclient requests scapy iperf3 RUN mkdir -p python_scripts/ \ mkdir -p packet_samples/ RUN git clone https://github.com/netsniff-ng/netsniff-ng.git COPY packet_samples/ packet_samples/ ADD python_scripts/iperf3_docker_client.py python_scripts/iperf3_docker_client.py ADD python_scripts/iperf3_docker_server.py python_scripts/iperf3_docker_server.py ADD python_scripts/ping_test.py python_scripts/ping_test.py RUN /netsniff-ng/configure WORKDIR /netsniff-ng RUN /netsniff-ng/configure && \ make && \ make install && WORKDIR / ENTRYPOINT ["/bin/bash"]
-
Awesome Penetration Testing
netsniff-ng - Swiss army knife for network sniffing.
Kaitai Struct
- Reverse-engineering an encrypted IoT protocol
-
Parsing an Undocumented File Format
- ImHex [2], which has a pattern language [3] which allows parsing, and it seems more powerful than what Kaitai offers. I stumbled upon some limitations with it but it was still useful.
[1]: https://kaitai.io/
- Kaitai Struct – a declarative language used to describe binary data structures
-
HTTPie Desktop: cross-platform API testing client for humans
Beautiful. Didn't know something like this exists. Reminds me of Katai[0]
[0]. https://kaitai.io/
-
Hacking the LG Monitor's EDID
An EDID override like this would be helpful for macOS as well, where the monitors swapping around after standby is a real annoyance [0] [1]
EDID rewrites are 99% of the time blocked by the monitor firmware: https://notes.alinpanaitiu.com/Decoding-monitor-EDID-on-macO...
By the way, one helpful tool that helped me navigate the EDID dump was Kaitai Struct [2]. It shows a side by side view with the hex view and the EDID structure, and it highlights the hex values in real time as you navigate the structure. Unfortunately [3] it doesn't support the extension blocks that the author needs.
[0] https://notes.alinpanaitiu.com/Weird-monitor-bugs
[1] https://forums.macrumors.com/threads/external-displays-swapp...
[2] https://kaitai.io/
[3] https://github.com/kaitai-io/edid.ksy
- Kaitai Struct: new way to develop parsers for binary structures
-
Fq: Jq for Binary Formats
Kaitai Struct might be a good choice for that: https://kaitai.io/
-
Ingesting, parsing and making sense of device log data
For binary log format, there's the excellent Kaitai Struct frameworks, that make it very easy to generate parsers from a declarative schema
-
What is this tool? More info in comments
kaitai
-
Visual Programming with Elixir: Learning to Write Binary Parsers (2019)
https://kaitai.io/
Worth a look if you are writing binary parsers.
What are some alternatives?
masscan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
Protobuf - Protocol Buffers - Google's data interchange format
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
csvkit - A suite of utilities for converting to and working with CSV, the king of tabular file formats.
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Camelot - A Python library to extract tabular data from PDFs
etl2pcapng - Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.
tablib - Python Module for Tabular Datasets in XLS, CSV, JSON, YAML, &c.
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
PDFMiner - Python PDF Parser (Not actively maintained). Check out pdfminer.six.
pwntools - CTF framework and exploit development library
PyYAML