Zapotek / cdpsnarfLinks
CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.
☆42Updated 15 years ago
Alternatives and similar repositories for cdpsnarf
Users that are interested in cdpsnarf are comparing it to the libraries listed below
Sorting:
- Password cracking utility☆53Updated 4 years ago
- Small backdoor using cookie.☆64Updated 9 years ago
- ☆28Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Black Nurse DOS attack☆72Updated 8 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 11 years ago
- Automatically exported from code.google.com/p/hexorbase☆74Updated 8 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- Massive arsenal of hacker tools...☆80Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆30Updated 9 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 4 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- ☆19Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
- lulz: automated webstalking tool☆52Updated 9 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- ☆91Updated 8 years ago
- The 802.11 Hacking Repo.☆39Updated 10 years ago