LeonardoNve / dns2proxyLinks
Offensive DNS server
☆318Updated 3 years ago
Alternatives and similar repositories for dns2proxy
Users that are interested in dns2proxy are comparing it to the libraries listed below
Sorting:
- SSLStrip version to defeat HSTS☆319Updated 7 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆180Updated 6 years ago
- Offensive DNS server☆64Updated 7 years ago
- Metasploit AV Evasion Tool☆260Updated 9 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆227Updated 7 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆502Updated 5 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆284Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- NTP Main-in-the-Middle tool☆245Updated 3 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆136Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆260Updated 7 years ago
- WIreless Hacking Tools☆165Updated 11 years ago
- Terminator metasploit payload generator☆179Updated 7 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- Script to steal passwords from ssh.☆481Updated 6 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆494Updated 3 years ago
- Modified hostapd to facilitate AP impersonation attacks☆511Updated 7 years ago
- The Credential Mapper☆443Updated 7 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- intercepting kali router☆439Updated 7 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆194Updated 6 years ago
- metasploitHelper☆249Updated 5 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,095Updated 6 years ago
- A unified console to perform the "kill chain" stages of attacks.☆204Updated last year
- The Hacker's ToolBox☆188Updated 7 years ago