mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2026-05-09 22:37:49 +08:00
Add Wireshark-MCP to tools section (#35)
Update README with RSS / update-readme (push) Has been cancelled
Update README with RSS / update-readme (push) Has been cancelled
* Initial plan * Add Wireshark-MCP to README tools section Co-authored-by: Mr-xn <18260135+Mr-xn@users.noreply.github.com> --------- Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: Mr-xn <18260135+Mr-xn@users.noreply.github.com>
This commit is contained in:
@@ -1694,6 +1694,7 @@
|
||||
- [AgentInjectTool:改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能](https://github.com/SummerSec/AgentInjectTool)
|
||||
- [ByPassBehinder4J:冰蝎Java WebShell免杀生成](https://github.com/Tas9er/ByPassBehinder4J)
|
||||
- [ecapture:通过 hook ebpf 技术,无需CA证书,进行HTTPS的明文通讯抓包、bash 命令捕获和 MySQL query 等数据库审计](https://github.com/ehids/ecapture)
|
||||
- [Wireshark-MCP:基于 MCP Server 将 tshark 转化为结构化分析接口,让 AI 助手直接分析 pcap 数据包文件,支持 Claude Desktop、Cursor 等 MCP 兼容客户端](https://github.com/bx33661/Wireshark-MCP)
|
||||
- [udpme:从协议层面借助 EDNS0 过滤掉有问题的 UDP 报文](https://github.com/IrineSistiana/udpme)
|
||||
- [FirmWire:支持三星和联发科的全系统基带固件分析平台](https://github.com/FirmWire/FirmWire)
|
||||
- [apache-afl:使用 AFL++ 对 Apache httpd 进行 Fuzz 的自动化配置](https://github.com/0xbigshaq/apache-afl)
|
||||
|
||||
Reference in New Issue
Block a user