pentesteracademy / voipsharkLinks
VoIPShark is a open source VoIP Analysis Platform which will allow people to analyze live or stored VoIP traffic, easily decrypt encrypted SRTP stream, perform macro analysis, generate summary specific to VoIP traffic/nodes and export calls/SMS/DTMF in popular user friendly file formats.
☆88Updated 5 years ago
Alternatives and similar repositories for voipshark
Users that are interested in voipshark are comparing it to the libraries listed below
Sorting:
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- WireBug is a toolset for Voice-over-IP penetration testing☆168Updated 3 years ago
- A "SIP Torture" (RFC 4475) testing framework.☆64Updated 2 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆73Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated last week
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- tshark + ELK analytics virtual machine☆69Updated 8 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Extract credentials and other useful info from network captures☆73Updated 2 years ago
- Docker images for learning wifi hacking☆70Updated 6 years ago
- Routopsy - Hacking Routers with Routers☆177Updated 4 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆26Updated 6 years ago
- Wireshark Profiles for SS7, Diameter & GTP☆27Updated 7 months ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- A WLAN red team framework.☆154Updated last year
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆51Updated 5 years ago
- ☆69Updated last month
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆72Updated 10 months ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- A BurpSuite extension to parse 5GC NF OpenAPI 3.0 files to assess 5G core networks☆74Updated 4 years ago
- Various pentest stuff☆22Updated 6 months ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- Clone network interface from one host as a tap interface on another host☆60Updated 4 years ago