yoshlsec / Plugins-WiresharkLinks
Two simple plugins for wireshark that can help in Network Forensics CTFs
☆12Updated 7 months ago
Alternatives and similar repositories for Plugins-Wireshark
Users that are interested in Plugins-Wireshark are comparing it to the libraries listed below
Sorting:
- ☆23Updated 7 months ago
- 🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.☆30Updated last year
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10Updated 6 months ago
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆49Updated last year
- ☆13Updated 10 months ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Updated 4 years ago
- Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas☆28Updated 9 months ago
- Sliver CheatSheet for OSEP☆210Updated last month
- Configuration files for desktop environment☆26Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆67Updated 11 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆117Updated last year
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆108Updated last month
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆108Updated 5 months ago
- ☆12Updated last year
- A guide to learning antivirus evasion☆56Updated 8 months ago
- Local File Inclusion Enumeration (PoC)☆59Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago
- Obfuscate the bytes of your payload with an association dictionary☆72Updated 3 weeks ago
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆24Updated 7 months ago
- Malicious Macro Generator for LibreOffice/OpenOffice☆57Updated 2 years ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆170Updated last month
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Updated 2 years ago
- ☆24Updated last year
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆28Updated last year
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender☆23Updated 10 months ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated 11 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆427Updated 10 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 8 months ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆14Updated last month
- Enhance Your Active Directory Password Spraying with User Intelligence.☆300Updated 3 months ago