BetterWayElectronics / bgp_spoofing_ssh_mitm
Short guide on how to achieve BGP spoofing and implement a MiTM attack against SSH
☆20Updated 4 years ago
Alternatives and similar repositories for bgp_spoofing_ssh_mitm:
Users that are interested in bgp_spoofing_ssh_mitm are comparing it to the libraries listed below
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- ☆41Updated 10 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Data exfiltration using DNS☆21Updated 5 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆4Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆12Updated 3 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- ☆22Updated 4 years ago
- ☆14Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Tools for auditing WAFS☆19Updated 2 years ago
- wordlists for password cracking☆25Updated 2 years ago
- ☆17Updated 6 months ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆18Updated last year
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- python wrapper to use tshark for file extraction from the command line.☆27Updated 6 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆21Updated last year
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 10 months ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago