alperenugurlu / Network_AssessmentLinks
With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the network you monitor.
☆146Updated last year
Alternatives and similar repositories for Network_Assessment
Users that are interested in Network_Assessment are comparing it to the libraries listed below
Sorting:
- Red Team Guides☆140Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- ☆24Updated last year
- Automate Scoping, OSINT and Recon assessments.☆97Updated this week
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- NetProbe: Network Probe☆164Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated 8 months ago
- Nuclei templates for honeypots detection.☆196Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆79Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆119Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆46Updated last year
- ☆65Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆75Updated last week
- This is an AD pentest tools collection☆59Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆101Updated 2 years ago
- ☆55Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- Discovering Typo Squatting on your domains!☆77Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- ☆91Updated 2 years ago
- ☆24Updated 8 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 3 weeks ago
- Capture screenshots of onion services on an onion service.☆72Updated last year