ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanisms to detect such attacks and protect the network from them.
☆23Nov 24, 2025Updated 3 months ago
Alternatives and similar repositories for ARP-Spoofing-Defender
Users that are interested in ARP-Spoofing-Defender are comparing it to the libraries listed below
Sorting:
- Reverse Shell - technique is commonly used in cyber attacks☆20Mar 2, 2024Updated 2 years ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- ☆38Apr 7, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- ☆27Nov 7, 2023Updated 2 years ago
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 2 years ago
- Jeopardy CTF platform☆12Jan 3, 2023Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- MS17-010 Tester☆13May 20, 2017Updated 8 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 2 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- ☆20Mar 21, 2024Updated last year
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- Collection's of Tech Talk that are presented by me :)☆101Jan 12, 2025Updated last year
- Android Overlay Hijack☆29Sep 11, 2024Updated last year
- Python module to analyze devices connected to the router and alert accordingly.☆19Aug 16, 2023Updated 2 years ago
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 3 months ago
- ☆47Feb 11, 2023Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆19Feb 18, 2024Updated 2 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago