6int / IPvSeeYouLinks
Repository for the IPvSeeYou talk at Black Hat 2021
☆86Updated 3 years ago
Alternatives and similar repositories for IPvSeeYou
Users that are interested in IPvSeeYou are comparing it to the libraries listed below
Sorting:
- Complete SMS packet manipulation☆114Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 4 years ago
- A rogue DNS detector☆23Updated 3 weeks ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Presentations from the CX Security Labs team☆33Updated last month
- USB testing made easy☆116Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆58Updated 3 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 5 years ago
- wordlists for password cracking☆28Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆102Updated 2 years ago
- SNIcat☆127Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated 9 months ago
- Open source tools, libraries, and datasets related to the runZero product and associated research☆121Updated 3 weeks ago
- random dissectors☆67Updated 2 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- Utility to find hidden Linux kernel modules☆144Updated last month
- Man in the Browser Framework☆50Updated 8 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago