SySS-Research / dns-mitmLinks
A minimal DNS service that can provide spoofed replies
☆102Updated 2 years ago
Alternatives and similar repositories for dns-mitm
Users that are interested in dns-mitm are comparing it to the libraries listed below
Sorting:
- Automated 802.1x Bypass☆86Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆171Updated 3 years ago
- UPnP hacking scripts and tools☆77Updated 8 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 7 months ago
- Responder for Python3☆100Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- macOS Privilege Escalation Helper☆141Updated 10 months ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆89Updated 4 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Updated 6 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆154Updated 6 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 7 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 6 years ago
- Enumerates users based off RDP Screenshots☆35Updated 2 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- Words list generator to crack security tokens☆111Updated 5 years ago
- ☆73Updated 6 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆139Updated last year
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago