Subterfuge-Framework / ArpmitmView external linksLinks
A Python/Scapy based ARP Cache Poisoning tool.
☆12Apr 3, 2016Updated 9 years ago
Alternatives and similar repositories for Arpmitm
Users that are interested in Arpmitm are comparing it to the libraries listed below
Sorting:
- Framework for Man-In-The-Middle attacks☆189Mar 19, 2017Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Sep 6, 2021Updated 4 years ago
- OverTheWire Wargames write-ups☆24Jun 13, 2017Updated 8 years ago
- detects several virtualizations☆45Dec 29, 2015Updated 10 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- DragonJAR Automatic Windows Forensic☆13May 23, 2017Updated 8 years ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆47Feb 11, 2025Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated last week
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- ARP cache poisoning implementation using Scapy☆13Jul 14, 2019Updated 6 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- GDB scripts☆14Nov 30, 2012Updated 13 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Transcribe Greek text to Latin alphabet using the ISO 843:1997 standard (also known as ELOT 743:1987)☆13Oct 12, 2022Updated 3 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 4 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Binary and Static Releases☆16Nov 18, 2025Updated 2 months ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 11 years ago
- ALL IN ONE Hacking Tool For Hackers☆10Dec 12, 2020Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago