Raw Packet Injection tool
☆240Aug 26, 2020Updated 5 years ago
Alternatives and similar repositories for Pinject
Users that are interested in Pinject are comparing it to the libraries listed below
Sorting:
- A Simple network sniffer implemented on Python 3☆74Jun 29, 2020Updated 5 years ago
- Simple Asynchronous HTTP Proxy written in python☆48Jul 12, 2014Updated 11 years ago
- Hidemyass Proxy Grabber☆89Mar 25, 2017Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Nscan: Fast internet-wide scanner☆534Feb 23, 2015Updated 11 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 10 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- ☆55Jul 20, 2017Updated 8 years ago
- Attack script and scanner for DNS based spoofed amplification attacks.☆20Oct 16, 2016Updated 9 years ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆65Aug 1, 2015Updated 10 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆446Aug 7, 2020Updated 5 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Dockerfile for BeEF (the Browser Exploitation Framework) build☆18Mar 8, 2015Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Jun 6, 2014Updated 11 years ago
- Linux Application Firewall☆58May 23, 2020Updated 5 years ago
- [Archived] A Bluetooth receiver implementation for GNU Radio☆215Aug 16, 2024Updated last year
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆25Oct 28, 2014Updated 11 years ago
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆12Feb 3, 2021Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- PoC for wget v1.19.1☆52Feb 2, 2018Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago