NetsecExplained / Advanced-Wireshark-Network-Forensics
If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "Here's an ARP frame, here's an IP packet, here's a web request..." But what they don't go into is: when you open a Pcap file for the first time, where do you start? What are the things that you look for? And ho…
☆19Updated 6 years ago
Alternatives and similar repositories for Advanced-Wireshark-Network-Forensics:
Users that are interested in Advanced-Wireshark-Network-Forensics are comparing it to the libraries listed below
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Python for Defenders Course Resources☆18Updated last year
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Create Password lists for cracking lyrical passwords☆14Updated 11 months ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Image Payload Creating/Injecting tools☆13Updated 3 years ago
- Sniffing out well-known threat groups☆28Updated 8 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆45Updated 2 weeks ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- A network logging tool that logs per process activities☆32Updated last year
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- The New Hacking Framework☆18Updated 8 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Resources for AD penetration testing and security☆30Updated 3 years ago
- A library that scrapes Linkedin for user data☆23Updated 3 years ago
- ☆20Updated last year
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆16Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- Random notes collected on the intertubes relating to DFIR☆32Updated last year