anumkhanit / azure-wireshark-network-protocols
A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark
☆17Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for azure-wireshark-network-protocols
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆14Updated last week
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆46Updated this week
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆72Updated this week
- one-stop resource for all things offensive security.☆165Updated this week
- Stalker, the Extensible Attack Surface Management tool.☆79Updated this week
- Bluetooth Landscape Exploration & Enumeration Platform☆47Updated last month
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆69Updated last month
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆33Updated this week
- Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams☆35Updated this week
- A Powerful Network Reconnaissance Tool for Security Professionals☆96Updated 4 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆32Updated last year
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆149Updated 8 months ago
- Identify hardcoded secrets in static structured text (version 2)☆88Updated this week
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Updated 4 months ago
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆102Updated 6 months ago
- A Pentest Collaboration and Reporting Tool☆50Updated this week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆77Updated 3 months ago
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆214Updated last week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated last month
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆34Updated 8 months ago
- Open-source best practices for protecting a secure, sensible cloud platform☆103Updated 3 weeks ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆262Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆69Updated 8 months ago
- A data-hiding / steganography-like CLI tool for JPG images.☆42Updated this week
- 📡 802.11 broadcast analyzer & injector☆128Updated last week
- God Mode Detection Rules☆131Updated 3 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆83Updated this week
- Halberd : Multi-Cloud Attack Tool☆209Updated this week
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆140Updated this week