This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random networks.
☆38Mar 14, 2019Updated 6 years ago
Alternatives and similar repositories for MagicPacketGenerator
Users that are interested in MagicPacketGenerator are comparing it to the libraries listed below
Sorting:
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Go tool to perform DNS rebinding☆24Nov 1, 2018Updated 7 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- Send and receive files securely through Tor.☆43Feb 25, 2023Updated 3 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- A cyber security-focused playing card game☆18Jan 27, 2021Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- A tiny set of helper scripts for ipinfo☆17Aug 7, 2020Updated 5 years ago
- A small script to automate project folder management and basic tool output☆34May 14, 2020Updated 5 years ago
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for…☆192Sep 6, 2020Updated 5 years ago
- intel amt honeypot☆18May 9, 2017Updated 8 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- ☆20Mar 18, 2018Updated 7 years ago
- ☆19Jul 21, 2022Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 9 months ago
- is a tool to automate and organize reconnaissance operations.☆24Sep 6, 2023Updated 2 years ago
- Dump of this tool I found☆23Sep 1, 2015Updated 10 years ago
- ☆21Mar 18, 2019Updated 6 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆35Sep 15, 2023Updated 2 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago