w4sp-book / w4sp-labView external linksLinks
Lab environment for the Wireshark for Security Professionals book
☆74May 10, 2020Updated 5 years ago
Alternatives and similar repositories for w4sp-lab
Users that are interested in w4sp-lab are comparing it to the libraries listed below
Sorting:
- Registry Explorer bookmark definitions☆44Dec 19, 2024Updated last year
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Jan 15, 2022Updated 4 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆25Apr 8, 2019Updated 6 years ago
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- ☆38Mar 4, 2020Updated 5 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- A multithread tool to scan for available APs and display their Signal Strength, Security Protocol, SSID and channels. Written in Python (…☆12Jul 6, 2021Updated 4 years ago
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- ☆47May 13, 2024Updated last year
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ☆27Jun 17, 2025Updated 7 months ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- A running list of applications and processes that just do not work with the total absence of IPv4 on on a host☆15Aug 5, 2023Updated 2 years ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆35Jan 13, 2026Updated last month
- Code from The PowerShell Conference Book☆16Apr 22, 2022Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- documentation, scripts, tools related to Zena Forensics (http://blog.digital-forensics.it)☆100Apr 21, 2017Updated 8 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- ☆57Jan 28, 2024Updated 2 years ago
- A tool to investigate the Windows device manager☆13Feb 12, 2019Updated 7 years ago
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- !indica is a fully customizable tool for streamers who recommend other streamers in their livestreams.☆10Dec 29, 2022Updated 3 years ago
- ☆12Dec 31, 2025Updated last month
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- A method for parsing Snort Barnyard2 logs from pfSense in Graylog☆10May 26, 2020Updated 5 years ago
- A complete installed Ubuntu desktop VirtualMachine with python2 and QuantSoftwareToolkit☆16Nov 5, 2014Updated 11 years ago
- ☆14Jul 1, 2025Updated 7 months ago
- scripts to automate configuration tasks in Fortigate☆10May 1, 2015Updated 10 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago