Add new section ("Network Packet Replay…") with three tools.

This commit is contained in:
Meitar M 2019-07-26 14:15:43 -04:00
parent fd37fae31a
commit fb35ce1de1
No known key found for this signature in database
GPG Key ID: 07EFAA28AB94BC85

View File

@ -39,6 +39,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
* [Exfiltration Tools](#exfiltration-tools)
* [Network Reconnaissance Tools](#network-reconnaissance-tools)
* [Protocol Analyzers and Sniffers](#protocol-analyzers-and-sniffers)
* [Network Traffic Replay and Editing Tools](#network-traffic-replay-and-editing-tools)
* [Proxies and Machine-in-the-Middle (MITM) Tools](#proxies-and-machine-in-the-middle-mitm-tools)
* [Transport Layer Security Tools](#transport-layer-security-tools)
* [Wireless Network Tools](#wireless-network-tools)
@ -365,6 +366,12 @@ See also [awesome-industrial-control-system-security](https://github.com/hslatma
* [sniffglue](https://github.com/kpcyrd/sniffglue) - Secure multithreaded packet sniffer.
* [tcpdump/libpcap](http://www.tcpdump.org/) - Common packet analyzer that runs under the command line.
### Network Traffic Replay and Editing Tools
* [bittwist](http://bittwist.sourceforge.net/) - Simple yet powerful libpcap-based Ethernet packet generator useful in simulating networking traffic or scenario, testing firewall, IDS, and IPS, and troubleshooting various network problems.
* [tcpreplay](https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
* [WireEdit](https://wireedit.com/) - Full stack WYSIWYG pcap editor (requires a free license to edit packets).
### Proxies and Machine-in-the-Middle (MITM) Tools
* [BetterCAP](https://www.bettercap.org/) - Modular, portable and easily extensible MITM framework.