NetsecExplained / Advanced-Wireshark-Network-Forensics
If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "Here's an ARP frame, here's an IP packet, here's a web request..." But what they don't go into is: when you open a Pcap file for the first time, where do you start? What are the things that you look for? And ho…
☆19Updated 6 years ago
Alternatives and similar repositories for Advanced-Wireshark-Network-Forensics:
Users that are interested in Advanced-Wireshark-Network-Forensics are comparing it to the libraries listed below
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- All the useful tools interesting to be used☆23Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated 11 months ago
- A curated list of Awesome Threat Intelligence resources☆16Updated 6 years ago
- Hunting Newly Registered Domains☆10Updated 6 years ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆11Updated 2 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- SANS Slingshot Linux Distribution☆48Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 4 years ago
- Sniffing out well-known threat groups☆28Updated 7 months ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆34Updated 3 months ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- Python for Defenders Course Resources☆16Updated last year
- Jupyter Notebooks for the Blue Team☆34Updated 2 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- Penetration Testing/Security Cheatsheets☆58Updated 9 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- ☆34Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- ☆16Updated 2 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆35Updated 5 years ago
- ReWrite of AChoir in Go for Cross Platform☆40Updated last month