6int / IPvSeeYouLinks
Repository for the IPvSeeYou talk at Black Hat 2021
☆87Updated 3 years ago
Alternatives and similar repositories for IPvSeeYou
Users that are interested in IPvSeeYou are comparing it to the libraries listed below
Sorting:
- Complete SMS packet manipulation☆114Updated 4 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆104Updated 2 years ago
- Presentations from the CX Security Labs team☆34Updated 2 months ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- A rogue DNS detector☆24Updated 2 months ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 5 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 4 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- ☆14Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆91Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- Application Hijack Scanner for macOS☆71Updated 4 years ago
- RDP honeypot☆67Updated 6 years ago
- Utility to find hidden Linux kernel modules☆146Updated 2 months ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆118Updated 2 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- SNIcat