w4sp-book / w4sp-lab
Lab environment for the Wireshark for Security Professionals book
☆71Updated 4 years ago
Alternatives and similar repositories for w4sp-lab:
Users that are interested in w4sp-lab are comparing it to the libraries listed below
- The Seeker of IOC☆129Updated 4 years ago
- Offsec PWB Lab Tools☆13Updated 11 years ago
- ☆92Updated 6 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆105Updated 8 years ago
- SpiderLabs shared Nmap Tools☆228Updated 4 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆149Updated 10 months ago
- fork of http://code.google.com/p/dnsmap/source/checkout☆114Updated 7 years ago
- XSS Payloads☆49Updated 9 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 9 years ago
- ☆44Updated 7 years ago
- Exfiltrate data with ICMP☆102Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- thethe☆116Updated 4 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Small CTF challenges running on Docker☆157Updated 6 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- ☆52Updated 4 years ago
- Database of websites for penetration testing☆174Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Common Findings Database☆100Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago