NetsecExplained / Advanced-Wireshark-Network-ForensicsLinks
If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "Here's an ARP frame, here's an IP packet, here's a web request..." But what they don't go into is: when you open a Pcap file for the first time, where do you start? What are the things that you look for? And ho…
☆20Updated 6 years ago
Alternatives and similar repositories for Advanced-Wireshark-Network-Forensics
Users that are interested in Advanced-Wireshark-Network-Forensics are comparing it to the libraries listed below
Sorting:
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- ☆44Updated 9 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆11Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Sniffing out well-known threat groups☆28Updated 10 months ago
- All the useful tools interesting to be used☆23Updated 2 years ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- Backstage Parser☆31Updated 3 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Hashes of infamous malware☆26Updated last year
- An automated e-mail OSINT tool☆21Updated 3 years ago
- ☆17Updated 3 years ago
- ☆34Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- ☆12Updated 4 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- Internal Network Penetration Test Playbook☆21Updated 3 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Wireless Pentesting Device☆22Updated 4 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- ☆21Updated 2 years ago