NetsecExplained / Advanced-Wireshark-Network-ForensicsLinks
If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "Here's an ARP frame, here's an IP packet, here's a web request..." But what they don't go into is: when you open a Pcap file for the first time, where do you start? What are the things that you look for? And ho…
☆21Updated 6 years ago
Alternatives and similar repositories for Advanced-Wireshark-Network-Forensics
Users that are interested in Advanced-Wireshark-Network-Forensics are comparing it to the libraries listed below
Sorting:
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- SANS Slingshot Linux Distribution☆51Updated 4 years ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆87Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆12Updated 2 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Jupyter Notebooks for the Blue Team☆36Updated 6 months ago
- ☆34Updated 2 years ago
- Your go-to resource for all things OSINT☆179Updated last year
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Updated 4 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆49Updated last week
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆15Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated 2 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- A library that scrapes Linkedin for user data☆23Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Cheat-Sheet of tools for penetration testing☆56Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆17Updated 6 years ago