rjbhide / wireshark-forensics-plugin
☆90Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for wireshark-forensics-plugin
- Collaborative pentest tool with highly customizable tools☆71Updated 2 years ago
- Active C2 IoCs☆96Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- ☆42Updated last year
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆21Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- A forensic evidence acquirer☆85Updated 3 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆135Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- ☆79Updated last year
- Linux Incident Response☆89Updated 5 years ago
- Citrix Scanner for CVE-2023-3519☆48Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆138Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆109Updated 2 years ago
- IoT and Operational Technology Honeypot☆105Updated last year
- Passive Security Tools Fingerprinting Framework☆72Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆104Updated 2 years ago
- nse script to inject jndi payloads☆45Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆83Updated 3 years ago
- Tool to discover external and internal network attack surface☆192Updated 5 months ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆105Updated 7 months ago
- Typodetect☆74Updated 3 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆167Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- Look into EDR events from network☆23Updated 6 months ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆65Updated 2 years ago