StackOverflowExcept1on / ip-spoofing
Library to send fake IPv4 headers & UDP/TCP-SYN packets to perform L3/L4 attacks
☆16Updated 6 months ago
Alternatives and similar repositories for ip-spoofing:
Users that are interested in ip-spoofing are comparing it to the libraries listed below
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 2 years ago
- HTTPBotNet☆21Updated last week
- Chat GPT Things by Taylor Newsome☆12Updated last year
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated last year
- 🧮 SOCKS5/4/4a 🌾 validating proxy pool and upstream SOCKS5 server for 🤽 LOLXDsoRANDum connections 🎋☆79Updated 5 months ago
- Multiplatform multithread efficient stream rust ransomware☆16Updated 2 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆51Updated last year
- A nice tool to get all discord token info☆12Updated last year
- A tool to download the breach data on BreachForums CND that was uploaded to the threat actor USDoD's CDN.☆37Updated 8 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 3 months ago
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆19Updated 7 months ago
- masscan with exclusive excludes☆54Updated last year
- Network scan tool for host and service discovery. Written in Rust.☆18Updated 8 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆36Updated 2 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆29Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆31Updated 11 months ago
- Pretty random INTERNET syn/ack scanner, useful for finding specific alive ports for research.☆24Updated 2 years ago
- Legba recipes.☆48Updated 7 months ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆18Updated last year
- ☆14Updated 2 years ago
- Keygen for Positive Technologies Network Attack Detector☆23Updated last year
- x86_64 LKM linux rootkit☆16Updated last year
- 🌐 Modern, lightweight WireGuard VPN web ui panel with a beautiful UI.☆17Updated last month
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆27Updated 8 months ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- Moobot Botnet | Leaked version☆15Updated 4 years ago
- Advanced dynamic malware analysis tool.☆78Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆42Updated last year