LetUsFsck / protokill
Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool
☆24Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for protokill
- Material from our CANAPE workshop☆32Updated 5 years ago
- Automated enumeration☆30Updated 3 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆62Updated 5 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- ☆27Updated 4 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 6 years ago
- New and Improved☆16Updated 8 years ago
- Rogue AP killer☆88Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆105Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- ☆25Updated 7 years ago
- The Zonefile Transfer Toolkit☆26Updated 2 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆49Updated 6 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 6 years ago