joswr1ght / nm2lp
Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format
☆15Updated 5 years ago
Alternatives and similar repositories for nm2lp:
Users that are interested in nm2lp are comparing it to the libraries listed below
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Carve Windows Prefetch files from arbitrary binary data☆14Updated 7 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Basic file metadata gathering script☆21Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 3 years ago
- Forensic Scanner☆41Updated 12 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 8 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- See here:☆42Updated 12 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year