0ki / SIPSALinks
Source IP spoofing for anonymization over UDP
☆24Updated 7 years ago
Alternatives and similar repositories for SIPSA
Users that are interested in SIPSA are comparing it to the libraries listed below
Sorting:
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- python tor client☆27Updated 10 years ago
- ☆12Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- ☆16Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Wardriving ekoparty☆15Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 6 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 11 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Updated 5 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- autoscan - automatic fingerprint of visited networks☆10Updated 12 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- WPS scan and pwn tool☆70Updated 6 years ago
- ☆54Updated 8 years ago