BetterWayElectronics / bgp_spoofing_ssh_mitm
Short guide on how to achieve BGP spoofing and implement a MiTM attack against SSH
☆20Updated 4 years ago
Alternatives and similar repositories for bgp_spoofing_ssh_mitm:
Users that are interested in bgp_spoofing_ssh_mitm are comparing it to the libraries listed below
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- wordlists for password cracking☆25Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 3 years ago
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- ☆14Updated 3 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- ☆17Updated 4 years ago
- ☆22Updated 4 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆68Updated last year
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated last year
- python wrapper to use tshark for file extraction from the command line.☆27Updated 6 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Kibana app for RedELK☆16Updated last year
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆11Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆32Updated 3 weeks ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago