BetterWayElectronics / bgp_spoofing_ssh_mitm
Short guide on how to achieve BGP spoofing and implement a MiTM attack against SSH
☆20Updated 4 years ago
Alternatives and similar repositories for bgp_spoofing_ssh_mitm:
Users that are interested in bgp_spoofing_ssh_mitm are comparing it to the libraries listed below
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- ☆27Updated 3 years ago
- ☆22Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ☆15Updated 3 years ago
- wordlists for password cracking☆27Updated 2 years ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago
- ☆17Updated 8 months ago
- C# User Simulation☆32Updated 2 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- ☆41Updated last year
- ☆11Updated 4 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆19Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- Red team oriented key finder and correlator☆16Updated last year