A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark
☆18Jan 27, 2026Updated 2 months ago
Alternatives and similar repositories for azure-wireshark-network-protocols
Users that are interested in azure-wireshark-network-protocols are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- Bluetooth Landscape Exploration & Enumeration Platform☆53Mar 4, 2026Updated last month
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆48Apr 10, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Mar 28, 2026Updated 3 weeks ago
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆87Feb 14, 2026Updated 2 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆55Feb 16, 2026Updated 2 months ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- Collection of best rices☆17Aug 18, 2025Updated 8 months ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆81Mar 6, 2025Updated last year
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆175Apr 23, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Red Kite, the Extensible Attack Surface Management tool.☆90Feb 8, 2026Updated 2 months ago
- A full insecure kubernetes application for testing security tools☆94Mar 28, 2026Updated 3 weeks ago
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Oct 22, 2025Updated 5 months ago
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆118Mar 13, 2025Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆66Nov 19, 2025Updated 5 months ago
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆127Sep 6, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- User-space Finite State Machine using (pretty much) Linux kernel functions.☆11Dec 26, 2025Updated 3 months ago
- Windows binaries for mickael9's script that extracts contents from BitRock installers.☆12Apr 18, 2021Updated 5 years ago
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆52Jan 16, 2026Updated 3 months ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆104Feb 25, 2026Updated last month
- My Privacy DNS #Matrix lists for blacklisting☆147Jan 4, 2026Updated 3 months ago
- Latest binary build is available from https://github.com/open-watcom/travis-ci-ow-builds/archive/master.zip and installers are available …☆14Nov 17, 2018Updated 7 years ago
- Outdated. See https://github.com/saleae/jtag-analyzer for the official Saleae JTAG Analyzer☆12May 21, 2018Updated 7 years ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 7 months ago
- ☆12Sep 5, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- a bash script to download with hundreds of parallel curls☆17Jan 12, 2013Updated 13 years ago
- C64 SID sound editor + player written in 6510 assembly☆15Apr 28, 2018Updated 7 years ago
- MongoDB CVE-2025-14847 Heap Memory Leak Scanner | OP_COMPRESSED zlib Vulnerability | Bug Bounty & Red Team Tool☆35Dec 28, 2025Updated 3 months ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 9 years ago
- ☆23Mar 4, 2025Updated last year
- eBPF Memory Dump Tool☆103Updated this week
- Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams☆80Apr 10, 2026Updated last week