wireshark / happy-shark
Wireshark regression tests
☆11Updated 4 years ago
Alternatives and similar repositories for happy-shark:
Users that are interested in happy-shark are comparing it to the libraries listed below
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Checklists☆16Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Network white noise collector☆18Updated 9 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 8 months ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 10 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- ☆15Updated 7 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- ☆15Updated 8 years ago
- Wireless regulatory database for CRDA☆13Updated 10 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago