averagesecurityguy / scapy
Scapy Presentation and Code
☆28Updated 9 years ago
Alternatives and similar repositories for scapy:
Users that are interested in scapy are comparing it to the libraries listed below
- Passive Network Audit Framework☆32Updated 6 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Prometheus Firewall Analyzer☆47Updated 9 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 7 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- AYY LMAO☆21Updated 9 years ago
- API Tools☆27Updated 8 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Updated 10 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆13Updated 8 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 5 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago