alperenugurlu / Network_AssessmentLinks
With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the network you monitor.
☆146Updated last year
Alternatives and similar repositories for Network_Assessment
Users that are interested in Network_Assessment are comparing it to the libraries listed below
Sorting:
- Automate Scoping, OSINT and Recon assessments.☆96Updated 8 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- Red Team Guides☆139Updated last year
- ☆24Updated last year
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆78Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Nuclei templates for honeypots detection.☆195Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- ☆65Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆141Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 7 months ago
- Pentest/Red Team: Resources, repos and scripts.☆72Updated 3 weeks ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last year
- Discovering Typo Squatting on your domains!☆72Updated last year
- ☆92Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆142Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Updated 11 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆101Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆90Updated 4 months ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- This is an AD pentest tools collection☆59Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆120Updated last year
- NetProbe: Network Probe☆164Updated 11 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆46Updated last year
- Capture screenshots of onion services on an onion service.☆71Updated last year