joswr1ght / nm2lpLinks
Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format
☆15Updated 5 years ago
Alternatives and similar repositories for nm2lp
Users that are interested in nm2lp are comparing it to the libraries listed below
Sorting:
- Oracle Attacks Tool☆13Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆46Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Tools for NTDS.dit☆17Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- See here:☆42Updated 12 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Breaking the security of Microsoft's RMS☆55Updated 5 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- ☆26Updated 5 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Basic file metadata gathering script☆21Updated 2 months ago