alperenugurlu / Network_AssessmentLinks
With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the network you monitor.
☆147Updated last year
Alternatives and similar repositories for Network_Assessment
Users that are interested in Network_Assessment are comparing it to the libraries listed below
Sorting:
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- Red Team Guides☆138Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated last year
- Automate Scoping, OSINT and Recon assessments.☆96Updated 5 months ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆65Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆137Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆79Updated last month
- ☆24Updated last year
- ☆63Updated last year
- This is an AD pentest tools collection☆59Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 8 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 4 months ago
- ☆24Updated 5 months ago
- NetProbe: Network Probe☆161Updated 9 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆131Updated 11 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆92Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆71Updated 2 weeks ago
- ☆114Updated last month
- ☆65Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Powershell tools used for Red Team / Pentesting.☆77Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year