yoshlsec / Plugins-WiresharkLinks
Two simple plugins for wireshark that can help in Network Forensics CTFs
☆12Updated 7 months ago
Alternatives and similar repositories for Plugins-Wireshark
Users that are interested in Plugins-Wireshark are comparing it to the libraries listed below
Sorting:
- ☆23Updated 7 months ago
- Configuration files for desktop environment☆26Updated last year
- Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas☆28Updated 10 months ago
- 🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.☆30Updated last year
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Updated 4 years ago
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆49Updated last year
- Local File Inclusion To Remote Command Execution (PoC)☆50Updated 2 years ago
- Local File Inclusion Enumeration (PoC)☆59Updated last year
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆111Updated 2 months ago
- ☆13Updated 11 months ago
- Sliver CheatSheet for OSEP☆220Updated 3 weeks ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆138Updated 8 months ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆13Updated 6 months ago
- Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection☆41Updated last year
- Malicious Macro Generator for LibreOffice/OpenOffice☆58Updated 2 years ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆170Updated last month
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆25Updated 8 months ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆28Updated 8 months ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated 11 months ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Updated 2 years ago
- ☆13Updated 7 months ago
- PDF dropper Red Team Scenairos☆225Updated last year
- Various notes I have compiled during the OSEP PEN-300 course.☆30Updated 9 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated last year
- Herramienta donde puedes practicar las vulnerabilidades web más conocidas. Email: info@webvulnlab.org☆59Updated 2 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆304Updated 3 months ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆444Updated 6 months ago
- ☆222Updated 8 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆428Updated 11 months ago