6int / IPvSeeYouLinks
Repository for the IPvSeeYou talk at Black Hat 2021
☆87Updated 3 years ago
Alternatives and similar repositories for IPvSeeYou
Users that are interested in IPvSeeYou are comparing it to the libraries listed below
Sorting:
- Complete SMS packet manipulation☆114Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 4 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆105Updated 2 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- USB testing made easy☆116Updated 2 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- A rogue DNS detector☆24Updated 2 months ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 5 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated last week
- Collection of my slide decks, conference videos and research white papers☆27Updated last month
- A simple binary wrapper for DNS canarytokens.☆25Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆141Updated 3 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 3 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 9 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Man in the Browser Framework☆50Updated 10 months ago
- Clone network interface from one host as a tap interface on another host☆60Updated 4 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Linux startup analyzer☆65Updated 5 months ago