0ki / SIPSALinks
Source IP spoofing for anonymization over UDP
☆25Updated 7 years ago
Alternatives and similar repositories for SIPSA
Users that are interested in SIPSA are comparing it to the libraries listed below
Sorting:
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- ☆15Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Updated 4 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- ☆16Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- python tor client☆27Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- TCP session interception and injection framework☆55Updated 14 years ago