SySS-Research / dns-mitmLinks
A minimal DNS service that can provide spoofed replies
☆102Updated 2 years ago
Alternatives and similar repositories for dns-mitm
Users that are interested in dns-mitm are comparing it to the libraries listed below
Sorting:
- Automated 802.1x Bypass☆87Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- Responder for Python3☆100Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Simple shell script to "clone" X.509 certificates☆111Updated 10 months ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 6 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Updated 6 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated 2 years ago
- ☆146Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆94Updated 7 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆103Updated 6 years ago
- A Win7 RDP exploit☆113Updated 6 years ago
- Executables that execute other stuff☆54Updated 7 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- Automatically spin up infra for phishing☆65Updated 6 years ago
- Tool to communicate with RPC services and check misconfigurations on NFS shares☆63Updated 6 years ago