SySS-Research / dns-mitmLinks
A minimal DNS service that can provide spoofed replies
☆103Updated 2 years ago
Alternatives and similar repositories for dns-mitm
Users that are interested in dns-mitm are comparing it to the libraries listed below
Sorting:
- Automated 802.1x Bypass☆86Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Simple shell script to "clone" X.509 certificates☆106Updated 3 months ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆151Updated 5 years ago
- ☆11Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- Tool to communicate with RPC services and check misconfigurations on NFS shares☆64Updated 5 years ago
- ☆74Updated 6 years ago
- UPnP hacking scripts and tools☆76Updated 8 years ago
- Responder for Python3☆100Updated 5 years ago
- Hiding implants in HTML files☆65Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- Docker images for learning wifi hacking☆67Updated 6 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆49Updated 5 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆71Updated 5 years ago
- ☆52Updated 5 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- Enumerates users based off RDP Screenshots☆34Updated last year
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Double-Free BUG in WhatsApp exploit poc.☆95Updated 5 years ago