NetsecExplained / Advanced-Wireshark-Network-ForensicsLinks
If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "Here's an ARP frame, here's an IP packet, here's a web request..." But what they don't go into is: when you open a Pcap file for the first time, where do you start? What are the things that you look for? And hoβ¦
β22Updated 7 years ago
Alternatives and similar repositories for Advanced-Wireshark-Network-Forensics
Users that are interested in Advanced-Wireshark-Network-Forensics are comparing it to the libraries listed below
Sorting:
- Small enough to carry on your back (Backpack) ππ»β32Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources tβ¦β56Updated 4 years ago
- Hashes of infamous malwareβ26Updated 2 years ago
- Jupyter Notebooks for the Blue Teamβ39Updated last year
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)β53Updated 5 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicatedβ¦β24Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 4 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!β63Updated 2 years ago
- Image Payload Creating/Injecting toolsβ13Updated 4 years ago
- SANS Slingshot Linux Distributionβ56Updated 5 years ago
- A curated list of Awesome Threat Intelligence resourcesβ19Updated 6 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and Aβ¦β20Updated 2 years ago
- Virus Total Free - IOC parser and report generatorβ24Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploiβ¦β83Updated 5 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can alβ¦β14Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security β¦β77Updated 2 years ago
- Files for my Python3 Create Your Own Tool Seriesβ25Updated 3 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.β44Updated 3 months ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial β¦β14Updated 4 years ago
- β12Updated 5 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.β34Updated 8 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- All the useful tools interesting to be usedβ24Updated 3 years ago
- β34Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β63Updated last year
- A network logging tool that logs per process activitiesβ32Updated 2 years ago
- Cheat-Sheet of tools for penetration testingβ54Updated 2 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.β27Updated 3 years ago
- Notes and Commands for CTFsβ22Updated 5 years ago
- Create visualization from Shodan queryβ75Updated 4 years ago