Collection of Wireshark resources & PCAP files used in the Blue Team training course
☆70Mar 20, 2022Updated 4 years ago
Alternatives and similar repositories for Wireshark-Traffic-Analysis
Users that are interested in Wireshark-Traffic-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆24Jul 19, 2019Updated 6 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- A collection of shell scripts from the scripting series.☆47Mar 1, 2022Updated 4 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆37Nov 3, 2019Updated 6 years ago
- Install LAMP(Linux + Apache + MySQL/MariaDB/Percona Server + PHP ) for CentOS/Fedora/Debian/Ubuntu☆10Apr 4, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆13Jan 9, 2026Updated 2 months ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- Freely available programming books☆69Oct 3, 2018Updated 7 years ago
- This repository is dedicated to hosting personal comprehensive walkthrough solutions for Splunk's Boss of the SOC (BOTS) CTF-style labs. …☆16Dec 30, 2023Updated 2 years ago
- Collection of exploits developed by your friendly clown☆14Oct 18, 2025Updated 5 months ago
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- This repository contains steps on how i set up a basic home lab running Active Directory.☆36Apr 2, 2023Updated 2 years ago
- a nginx reverse proxy with ssl and auth for MobSF☆26Mar 5, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Deception implementation through analysis of BloodHound data☆57Updated this week
- WikiLeaks Vault 7 CIA Hacking Tools☆15Sep 9, 2017Updated 8 years ago
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- A list of web application security☆79Oct 8, 2018Updated 7 years ago
- httptools helps you to capture, repeat and live intercept HTTP requests with scripting capabilities. It is built on top of mitmproxy☆83Mar 12, 2026Updated 2 weeks ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆44Oct 10, 2024Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tools around MobSF security mobile testing solution☆14Sep 24, 2019Updated 6 years ago
- A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and mana…☆12Mar 29, 2020Updated 6 years ago
- Practical Bug Bounty Hunting for Hackers and Pentesters, by EC-Council☆23Oct 6, 2021Updated 4 years ago
- The Faction Burp Suite Extension☆13Mar 18, 2024Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- ExplorerPy is a scanning-toolkit . It can perform subdomain enumeration, directory brute-forcing, and port scanning.☆10Jan 30, 2024Updated 2 years ago
- The C Programming Language Book by Brian W. Kernighan and Dennis M. Ritchie - solved exercises☆16Apr 26, 2022Updated 3 years ago
- SSE to Stdio MCP Proxy Server☆20Mar 9, 2026Updated 3 weeks ago
- dotties <3☆18Sep 6, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Training for Golang (go language)☆10Mar 29, 2019Updated 7 years ago
- ☆18Apr 26, 2025Updated 11 months ago
- ☆21Dec 7, 2022Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Source of http://madhur.co.in☆33Feb 28, 2026Updated last month
- ☆70Jan 20, 2026Updated 2 months ago
- This is where I would like to share the pcaps I use in my YouTube videos.☆58Feb 3, 2026Updated last month