Raw Packet Injection tool
☆240Aug 26, 2020Updated 5 years ago
Alternatives and similar repositories for Pinject
Users that are interested in Pinject are comparing it to the libraries listed below
Sorting:
- A Simple network sniffer implemented on Python 3☆74Jun 29, 2020Updated 5 years ago
- Simple Asynchronous HTTP Proxy written in python☆48Jul 12, 2014Updated 11 years ago
- DDoS Amplification Tool☆1,009Apr 25, 2023Updated 2 years ago
- Hidemyass Proxy Grabber☆89Mar 25, 2017Updated 8 years ago
- Nscan: Fast internet-wide scanner☆535Feb 23, 2015Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- open source DDoS Amplification Tool with scanners.☆48Jun 1, 2017Updated 8 years ago
- Attack script and scanner for DNS based spoofed amplification attacks.☆20Oct 16, 2016Updated 9 years ago
- A firefox profile for web security enthusiasts (Supposed to be configured with woobuntu )☆10Jul 6, 2016Updated 9 years ago
- ☆55Jul 20, 2017Updated 8 years ago
- Upnp client written completely in python☆22Dec 14, 2016Updated 9 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- ☆14May 12, 2021Updated 4 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 11 years ago
- Find interesting internet-exposed cameras through the Shodan API☆16Mar 25, 2021Updated 4 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Gathering Email Information Tool☆38Mar 1, 2017Updated 9 years ago
- ☆12Apr 1, 2023Updated 2 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆65Aug 1, 2015Updated 10 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 8 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- NSA finest tool☆33Apr 27, 2017Updated 8 years ago
- ☆13Jan 26, 2024Updated 2 years ago
- external weapon id dumper☆18May 4, 2019Updated 6 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago
- A sleek remote administration tool☆12Jan 30, 2021Updated 5 years ago
- This repository has a internal model changer with FindMDL Hook for Counter-Strike: Global Offensive game. It's fully open source and load…☆12Apr 11, 2025Updated 11 months ago
- A gui installer for woobuntu tools☆17Jun 20, 2016Updated 9 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- Detect some forms of linux kernel tampering☆12Jun 12, 2015Updated 10 years ago
- The state of the art, modular, portable and easily extensible MITM framework in a Docker Container.☆14Dec 30, 2017Updated 8 years ago
- Make changes to A2S_INFO and A2S_PLAYER packets being sent from your GMod server☆16Feb 14, 2019Updated 7 years ago