danielmiessler / CaparserLinks
A quick and dirty PCAP parser that helps you identify who your applications are sending sensitive data to without encryption.
☆116Updated last year
Alternatives and similar repositories for Caparser
Users that are interested in Caparser are comparing it to the libraries listed below
Sorting:
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆176Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆115Updated 6 years ago
- scripts for pentesting☆86Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Maltego integration of https://haveibeenpwned.com☆62Updated 9 months ago
- Pentesting suite for Maltego based on data in a Metasploit database☆149Updated 7 years ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆137Updated 2 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- ☆153Updated 2 years ago
- osint_tools_security_auditing☆156Updated 9 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Updated 9 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆100Updated 3 years ago
- Additional modules for recon-ng☆106Updated 7 years ago
- Reconnaissance scripts for penetration testing☆59Updated 10 years ago
- Command line go0gle dorking tool☆139Updated 12 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆86Updated 11 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆67Updated 7 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- ☆104Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆39Updated 9 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Malicious Link Blog☆25Updated 2 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆74Updated 3 years ago
- BugOutBag☆68Updated 3 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Updated 8 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆243Updated 5 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago