alperenugurlu / Network_AssessmentLinks
With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the network you monitor.
☆147Updated last year
Alternatives and similar repositories for Network_Assessment
Users that are interested in Network_Assessment are comparing it to the libraries listed below
Sorting:
- Red Team Guides☆139Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- Nuclei templates for honeypots detection.☆197Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆67Updated last year
- ☆64Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆72Updated last month
- This is an AD pentest tools collection☆58Updated last year
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆138Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 5 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- ☆24Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated 2 months ago
- Powershell tools used for Red Team / Pentesting.☆78Updated last year
- Capture screenshots of onion services on an onion service.☆70Updated last year
- ☆92Updated 2 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆91Updated last year
- NetProbe: Network Probe☆162Updated 9 months ago
- ☆24Updated 6 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- ☆54Updated 6 months ago
- Garudaastra Tool is based on python3 to find cameras around the world☆27Updated 2 years ago
- ☆191Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago