6int / IPvSeeYouLinks
Repository for the IPvSeeYou talk at Black Hat 2021
☆87Updated 3 years ago
Alternatives and similar repositories for IPvSeeYou
Users that are interested in IPvSeeYou are comparing it to the libraries listed below
Sorting:
- Complete SMS packet manipulation☆113Updated 4 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 5 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆107Updated 2 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- USB testing made easy☆119Updated 2 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆131Updated last year
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆93Updated last year
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- RDP honeypot☆68Updated 6 years ago
- Presentations from the CX Security Labs team☆35Updated 4 months ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆91Updated 3 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆189Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Updated 3 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- This is a concept poc of command and control server implemented over blockchain☆54Updated 6 years ago
- random dissectors☆68Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Application Hijack Scanner for macOS☆71Updated 4 years ago
- SNIcat☆128Updated 4 years ago
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago