yoshlsec / Plugins-WiresharkLinks
Two simple plugins for wireshark that can help in Network Forensics CTFs
☆12Updated 3 months ago
Alternatives and similar repositories for Plugins-Wireshark
Users that are interested in Plugins-Wireshark are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 months ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10Updated 2 months ago
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆46Updated last year
- Malicious Macro Generator for LibreOffice/OpenOffice☆39Updated 2 years ago
- Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas☆28Updated 5 months ago
- 🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.☆28Updated last year
- Configuration files for desktop environment☆26Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆112Updated last year
- Enhance Your Active Directory Password Spraying with User Intelligence☆52Updated 2 weeks ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆13Updated 4 years ago
- Local File Inclusion Enumeration (PoC)☆61Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆56Updated 7 months ago
- ☆13Updated 6 months ago
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆1Updated last year
- This is for Ethical Use only.☆418Updated 2 months ago
- Sliver CheatSheet for OSEP☆99Updated 2 months ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆13Updated 2 years ago
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆22Updated 4 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆25Updated 8 months ago
- Exploits for some windows binaries :)☆48Updated 6 months ago
- ☆11Updated 2 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆27Updated last year
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆176Updated 5 months ago
- Log-Zapper is a linux and windows secure Log cleaner.☆20Updated last year
- Generate FUD backdoors☆249Updated 2 years ago
- ReflectUnhook - Tool designed to neutralize AV/EDR hooks.☆11Updated 8 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆158Updated last month
- Obfuscate the bytes of your payload with an association dictionary☆68Updated 2 months ago
- A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.☆233Updated this week
- A solution to create obfuscated reverse shells for PowerShell.☆78Updated 3 years ago