rjbhide / wireshark-forensics-plugin
☆95Updated 3 years ago
Alternatives and similar repositories for wireshark-forensics-plugin:
Users that are interested in wireshark-forensics-plugin are comparing it to the libraries listed below
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆94Updated 3 years ago
- ☆42Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated last month
- Active C2 IoCs☆98Updated 2 years ago
- A forensic evidence acquirer☆86Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆72Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆139Updated last year
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆127Updated 9 months ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆112Updated 2 years ago
- PyQT5 app for LOLBAS and GTFOBins☆46Updated 2 years ago
- Citrix Scanner for CVE-2023-3519☆50Updated last year
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Linux Incident Response☆90Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆113Updated 3 years ago
- ☆65Updated 3 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆38Updated last year
- IoT and Operational Technology Honeypot☆105Updated last year
- A small util to brute-force prefetch hashes☆76Updated 2 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- ☆80Updated last year
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆21Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 3 years ago