CiscoCXSecurity / suddensixLinks
IPV6 MITM attack tool
☆92Updated 11 years ago
Alternatives and similar repositories for suddensix
Users that are interested in suddensix are comparing it to the libraries listed below
Sorting:
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- Automatically performs the SMB relay attack☆72Updated 9 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆85Updated 6 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- ☆47Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- Masscan integrated with Shodan API☆40Updated 7 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆124Updated 10 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 8 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- ☆54Updated 8 years ago
- SQL SERVER Exploitation.☆27Updated 8 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Updated 6 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 5 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆121Updated 5 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 8 years ago