rjbhide / wireshark-forensics-plugin
☆92Updated 3 years ago
Alternatives and similar repositories for wireshark-forensics-plugin:
Users that are interested in wireshark-forensics-plugin are comparing it to the libraries listed below
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- ☆41Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆111Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Updated 3 years ago
- A forensic evidence acquirer☆85Updated 3 years ago
- Active C2 IoCs☆97Updated 2 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago
- ☆79Updated last year
- Tool to discover external and internal network attack surface☆193Updated 7 months ago
- First iteration of ML based Feedback WAF☆58Updated 9 months ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆126Updated 6 months ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆148Updated 3 years ago
- CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆21Updated 4 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- Citrix Scanner for CVE-2023-3519☆49Updated last year
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆175Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆104Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆147Updated 10 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆86Updated 3 years ago
- Linux Evidence Acquisition Framework☆114Updated 3 months ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 3 years ago
- nse script to inject jndi payloads☆45Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆67Updated 2 years ago
- A small util to brute-force prefetch hashes☆76Updated 2 years ago