0ki / SIPSA
Source IP spoofing for anonymization over UDP
☆25Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for SIPSA
- find and detect Malicious TOR Relays☆14Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆31Updated 8 years ago
- ☆15Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- Phishing Toolkit☆19Updated 6 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 8 years ago
- A multi service threaded MD5 cracker☆65Updated 8 years ago
- ☆32Updated 10 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 7 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Optional plugins for MITMf☆15Updated 9 years ago