TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files
☆132Jun 1, 2024Updated last year
Alternatives and similar repositories for TrafficWatch
Users that are interested in TrafficWatch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆93May 31, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- NetProbe: Network Probe☆172Oct 13, 2024Updated last year
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆177Jan 6, 2026Updated 2 months ago
- Reverse shell that can bypass windows defender detection☆171Feb 3, 2024Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- ☆24Nov 18, 2023Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Mar 9, 2020Updated 6 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆145May 17, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆117Feb 23, 2026Updated last month
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆105Dec 8, 2025Updated 3 months ago
- PassBreaker☆66Apr 5, 2024Updated last year
- Simple Latest CVE Collector Written in Python☆59Feb 29, 2024Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆160Sep 7, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 3 months ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago