DanMcInerney / dnsspoofView external linksLinks
DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response
☆292Apr 16, 2017Updated 8 years ago
Alternatives and similar repositories for dnsspoof
Users that are interested in dnsspoof are comparing it to the libraries listed below
Sorting:
- Prints the IPs on your local network that're sending the most packets☆152Jul 20, 2021Updated 4 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 10 years ago
- Find wifi channel with least interference☆54Jul 21, 2019Updated 6 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- Inject code and spy on wifi users☆2,615Jul 31, 2021Updated 4 years ago
- Sniffs sensitive data from interface or pcap☆1,811Nov 2, 2023Updated 2 years ago
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- Does some google dorks against a domain☆165Jan 20, 2020Updated 6 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- Create fake AP in Kali with 1 command☆269Nov 25, 2015Updated 10 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Scrape google search results☆94Aug 24, 2018Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 11 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 6 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- SSLStrip version to defeat HSTS☆323Sep 21, 2017Updated 8 years ago
- Offensive DNS server☆323Jan 18, 2022Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Feb 26, 2018Updated 7 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- Framework for Man-In-The-Middle attacks☆3,637Aug 28, 2018Updated 7 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Jan 20, 2018Updated 8 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 7 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- Continuously jam all wifi clients/routers☆4,214Jul 20, 2024Updated last year
- A tool to uncover hidden SSIDs☆13Apr 17, 2019Updated 6 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Apr 13, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago