Passive OS detection based on SYN packets without Transmitting any Data
☆50Mar 29, 2023Updated 3 years ago
Alternatives and similar repositories for smudge
Users that are interested in smudge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extracts fields from zeek logs, compatible with zeek-cut☆27Jul 10, 2024Updated last year
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆81Mar 19, 2026Updated last month
- Template for building a packet sniffer☆15Mar 25, 2024Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- ☆46Jun 1, 2025Updated 11 months ago
- ☆21Oct 28, 2021Updated 4 years ago
- line based tcp load balancing proxy.☆14Jun 18, 2024Updated last year
- Implementations of the GEA-1 and GEA-2 (GPRS Encryption Algorithm) stream ciphers in C, Python and Rust.☆17Mar 29, 2026Updated last month
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆303Mar 19, 2026Updated last month
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- Sets up all the layers needed to log in over ssh with ssh keys☆17Jul 29, 2025Updated 9 months ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Unicode Security Toolkit☆21Updated this week
- Collection of information and scripts associated with my WWWD DC29 wardriving rig☆14Sep 29, 2021Updated 4 years ago
- POC for .NET mssql client for accessing database data through beacon☆64Sep 12, 2023Updated 2 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- ☆10May 25, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 6 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- ☆19Apr 22, 2026Updated last week
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 6 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Mar 1, 2016Updated 10 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- ☆13Mar 12, 2022Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Apr 30, 2021Updated 5 years ago
- Tools for simulating threats☆203Oct 27, 2023Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago