Zapotek / cdpsnarf
CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.
☆41Updated 14 years ago
Alternatives and similar repositories for cdpsnarf:
Users that are interested in cdpsnarf are comparing it to the libraries listed below
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Password cracking utility☆53Updated 4 years ago
- Black Nurse DOS attack☆72Updated 7 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Post-Exploitation Framework☆77Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Software exploitation training material☆15Updated 7 years ago
- Small backdoor using cookie.☆60Updated 8 years ago
- ☆47Updated 9 years ago
- Tools and scripts dedicated to Android application security☆49Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆50Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 6 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆12Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆43Updated 9 years ago