0x90 / uberscapy
Scapy docs, examples, scripts and other stuff
☆40Updated 10 years ago
Alternatives and similar repositories for uberscapy:
Users that are interested in uberscapy are comparing it to the libraries listed below
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- ☆27Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- ARPER is an arp cache poisoning tool, it sends spoofed address resolution protocol messages onto a local area network. It has the abilit…☆8Updated 10 years ago
- Prometheus Firewall Analyzer☆47Updated 9 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- See here:☆42Updated 12 years ago
- Modular tool to test exfiltration techniques.☆37Updated 7 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆38Updated 10 years ago