SnehaPathrose / DNSSpoofAndDetectLinks
develop 1) an on-path DNS packet injector, and 2) a passive DNS poisoning attack detector. Part 1: The DNS packet injector you are going to develop, named 'dnsinject', will capture the traffic from a network interface in promiscuous mode, and attempt to inject forged responses to selected DNS A requests with the goal to poison the resolver's c…
☆18Updated 7 years ago
Alternatives and similar repositories for DNSSpoofAndDetect
Users that are interested in DNSSpoofAndDetect are comparing it to the libraries listed below
Sorting:
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- script to brute force ssh or ftp passwords☆12Updated 8 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆18Updated 6 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Web Information Gathering☆18Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- PassWord List Maker☆17Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- ☆13Updated 4 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Mobile phone PWN tools and scripts☆14Updated 4 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- CCTV Camera scanner using the GoAhead webserver exploit☆17Updated 2 weeks ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Scripts used for phishing campaigns☆14Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 11 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- simple javascript keylogger google chrome☆8Updated 5 years ago
- port scanner & login credential tester☆16Updated 6 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- Collection of cracked malware☆14Updated 6 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Updated 11 years ago