arpitn30 / nipper-ngView external linksLinks
Automatically exported from code.google.com/p/nipper-ng
☆73Jun 28, 2022Updated 3 years ago
Alternatives and similar repositories for nipper-ng
Users that are interested in nipper-ng are comparing it to the libraries listed below
Sorting:
- ☆34Nov 16, 2023Updated 2 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Cymothoa is a backdooring tool, that inject backdoor's shellcode directly into running applications. Stealth and lightweight...☆18Aug 24, 2015Updated 10 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Aug 8, 2020Updated 5 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Sep 20, 2016Updated 9 years ago
- Microsoft Compound File Binary (CFB) file format Python IO☆15Aug 27, 2014Updated 11 years ago
- ☆15Mar 13, 2018Updated 7 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆11Feb 10, 2013Updated 13 years ago
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13May 22, 2023Updated 2 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 5 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- PDF Parser is a command line tool and go library for analyzing PDF files.☆14Jan 25, 2024Updated 2 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆12Dec 3, 2020Updated 5 years ago
- ☆12Jun 27, 2019Updated 6 years ago
- t50 : Multi-protocol packet injector tool☆25Sep 20, 2015Updated 10 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool☆41Dec 5, 2025Updated 2 months ago
- URLCrazy☆31Apr 29, 2013Updated 12 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Network Forensics Bro scripts & pcap samples☆63Mar 11, 2014Updated 11 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- ohrwurm is an RTP fuzzer. features some SIP parsing and RTCP suppressing.☆17Sep 30, 2010Updated 15 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆18Sep 6, 2024Updated last year
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago