yoshlsec / Plugins-WiresharkView external linksLinks
Two simple plugins for wireshark that can help in Network Forensics CTFs
☆12Apr 21, 2025Updated 9 months ago
Alternatives and similar repositories for Plugins-Wireshark
Users that are interested in Plugins-Wireshark are comparing it to the libraries listed below
Sorting:
- ☆26Apr 24, 2025Updated 9 months ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 8 months ago
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- HackTheBox rich presence for Discord☆13May 30, 2024Updated last year
- Configuration files for desktop environment☆26Feb 20, 2024Updated last year
- My mobile writeups repository☆23Nov 19, 2025Updated 2 months ago
- 🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.☆30May 10, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- ☆13Jan 17, 2025Updated last year
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆15Jun 2, 2025Updated 8 months ago
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- a simple HTML/JQuery file upload system that is powered by node.js and MongoDB's GridFS☆13Aug 9, 2013Updated 12 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- PenKraken, herramienta de automatizacion de hacking Etico / Pentesting☆12Jun 14, 2024Updated last year
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 5 months ago
- Random perl scripts from 2007 that may be usefull☆15Nov 21, 2015Updated 10 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- ☆13Mar 23, 2024Updated last year
- PoC arbitrary WPM without a process handle☆21Jul 22, 2023Updated 2 years ago
- Quick command to add a key and sub-key into Windows 11 Registry Editor that brings back the windows 10 right click context menu☆18Sep 25, 2022Updated 3 years ago
- Modified Spool Sample for SEImpersonate Privilege Escalation.☆17Aug 3, 2022Updated 3 years ago
- [CVE-2017-9822] DotNetNuke Cookie Deserialization Remote Code Execution (RCE)☆20Aug 30, 2020Updated 5 years ago
- A collection of password cracking rules☆20Jul 15, 2020Updated 5 years ago
- Cheatsheets☆19Jul 4, 2022Updated 3 years ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆26Jun 11, 2025Updated 8 months ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆26Apr 2, 2025Updated 10 months ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Jan 27, 2022Updated 4 years ago
- Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088☆53Aug 18, 2025Updated 5 months ago
- Create a blog☆33May 25, 2024Updated last year
- This script takes one or more animated GIF files as input and calculates their total durations.☆30Mar 28, 2025Updated 10 months ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆25Feb 11, 2023Updated 3 years ago
- The Bitonics font and CSS toolkit☆23Feb 3, 2018Updated 8 years ago
- ☆30Apr 6, 2022Updated 3 years ago
- Exploits for some linux binaries :)☆37Nov 2, 2025Updated 3 months ago
- The code I write in my blog☆62Jan 29, 2026Updated 2 weeks ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago