NetsecExplained / Advanced-Wireshark-Network-ForensicsLinks
If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "Here's an ARP frame, here's an IP packet, here's a web request..." But what they don't go into is: when you open a Pcap file for the first time, where do you start? What are the things that you look for? And ho…
☆22Updated 7 years ago
Alternatives and similar repositories for Advanced-Wireshark-Network-Forensics
Users that are interested in Advanced-Wireshark-Network-Forensics are comparing it to the libraries listed below
Sorting:
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- ☆34Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Your go-to resource for all things OSINT☆181Updated last year
- Submits multiple domains to VirusTotal API☆58Updated 4 years ago
- ☆17Updated 3 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Updated 4 years ago
- Defence Against the Dark Arts☆34Updated 6 years ago
- All the useful tools interesting to be used☆23Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- ☆32Updated last year
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- Commands used in Windows penetration tests☆55Updated 2 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- SANS Slingshot Linux Distribution☆55Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆19Updated 6 years ago
- Virus Total Free - IOC parser and report generator☆24Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated 2 months ago
- Python command line tool used for generating GIAC Certification indexes.☆29Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago