A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybersecurity professionals and enthusiasts.
☆17Oct 20, 2024Updated last year
Alternatives and similar repositories for Scapy-Network-Security-Tools
Users that are interested in Scapy-Network-Security-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 6 months ago
- ☆13Dec 15, 2024Updated last year
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Summation of the OWASP Testing Guide for reference☆10Jun 19, 2017Updated 8 years ago
- An AI voice changer harnessing the power of Open AI and VoiceVox for seamless voice transformation.☆21Sep 24, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An intuitive and easy to use interface for converting live and tv poker hands to a PokerStars Hand History file format.☆11Mar 27, 2026Updated last month
- PhantomCV is an open source OpenCV script for use with Titan Two and Gtuner.☆25Apr 11, 2023Updated 3 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago
- ☆22Feb 3, 2026Updated 2 months ago
- Elevate your bug bounty game with our treasure trove of FREE resources! 🚀 Dive into a world of expert guides, cheat sheets, and tools to…☆23Oct 19, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Arch dots☆35Apr 22, 2026Updated last week
- ☆22Jan 29, 2025Updated last year
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- OWASP WSTG Türkçe Rehber☆16Apr 9, 2025Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 6 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆13Jan 11, 2026Updated 3 months ago
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 3 months ago
- Torify the system with multiple tor exit nodes and load balance.☆18May 29, 2024Updated last year
- Template Nuclei SSTI☆34Nov 18, 2025Updated 5 months ago
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆15May 10, 2023Updated 2 years ago
- Proof of concept & details for CVE-2025-21298☆198Jan 20, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- ☆12Dec 6, 2022Updated 3 years ago
- Ping Monster v1.9 - a freeware ping monitoring tool, with some alert actions like: send email, sound alert, http post.☆11Sep 6, 2023Updated 2 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆18Apr 8, 2026Updated 3 weeks ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 10 months ago
- ☆14Feb 20, 2025Updated last year