Hands-On Network Forensics by Nipun Jaswal
☆62Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for networkforensics
Users that are interested in networkforensics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wireless Forensics Framework In Python☆20Jan 29, 2017Updated 9 years ago
- A repo that contains links to projects by members of the Digital Forensics Discord Server! This is meant to help promote projects made by…☆21Apr 23, 2026Updated 2 weeks ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Modbus TCP vulnerability demonstration☆16Jan 22, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆16Aug 29, 2018Updated 7 years ago
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆48Jul 19, 2024Updated last year
- FRAC and RIFT☆17Mar 16, 2019Updated 7 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Library of python scripts to apply Data Science in several forensics artifacts☆31Jul 16, 2020Updated 5 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- ☆16Oct 17, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Network Forensic Extendable Analysis Tool☆40May 22, 2022Updated 3 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Apr 6, 2026Updated last month
- ☆18Sep 1, 2018Updated 7 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 11 years ago
- Template for building a packet sniffer☆15Mar 25, 2024Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆25Aug 1, 2022Updated 3 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- A curated list of digital forensic tools.☆21Dec 2, 2019Updated 6 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- Advanced Reconnaissance Framework — Google Chrome extension☆30Mar 4, 2016Updated 10 years ago
- High Interaction Honeypot Solution for Redis protocol☆25Apr 23, 2021Updated 5 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Pysharkfeat is a TLS encrypted traffic feature extraction tool from pcaps written in Python by using Wireshark's command line tshark.☆14Jul 1, 2022Updated 3 years ago
- Test of http://www.malwaredomainlist.com/hostslist/hosts.txt☆14Updated this week
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- The Software Management System (SWM) drives software install, upgrade, and removal use cases.☆12Aug 7, 2017Updated 8 years ago
- ☆18Jul 27, 2017Updated 8 years ago
- This tool help to find email header hop list . Also help to SpF and DKIM signature verification. You can check all mail is legitimate or …☆14May 1, 2023Updated 3 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- A program for backup & restoration of btrfs subvolumes.☆13Mar 20, 2026Updated last month