6int / IPvSeeYou
Repository for the IPvSeeYou talk at Black Hat 2021
☆70Updated 2 years ago
Related projects: ⓘ
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆57Updated 2 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆88Updated last year
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆38Updated 4 years ago
- ☆61Updated this week
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- DNS server for pentesters☆48Updated 2 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- ☆43Updated this week
- THC "R U There" network discovery tool☆26Updated 4 years ago
- ☆36Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago
- ☆18Updated 3 years ago
- Complete SMS packet manipulation☆100Updated 2 years ago
- ☆31Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆54Updated 3 years ago
- Presentations from the CX Security Labs team☆32Updated 6 months ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆109Updated 5 months ago
- A Passive SSH back-end and scanner.☆102Updated 3 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆46Updated last year
- An eBPF detection program for CVE-2022-0847☆27Updated 2 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆42Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆62Updated 4 years ago
- AXFR all the things!☆23Updated 3 months ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 2 years ago
- ☆42Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- WhiteBeam: Transparent endpoint security☆94Updated last year
- Data exfiltration and covert communication tool☆36Updated last year
- A golang library designed to interact with Metasploit☆42Updated 3 years ago