Scapy Presentation and Code
☆28Oct 19, 2015Updated 10 years ago
Alternatives and similar repositories for scapy
Users that are interested in scapy are comparing it to the libraries listed below
Sorting:
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27May 6, 2021Updated 4 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Scapy docs, examples, scripts and other stuff☆40Mar 4, 2015Updated 11 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- A Simple ARP Spoofer using Scapy☆108Jul 20, 2015Updated 10 years ago
- ☆11Oct 15, 2018Updated 7 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Dec 20, 2018Updated 7 years ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Fork of Conversations - XMPP/Jabber client for Android with I2P support☆14Dec 19, 2023Updated 2 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- Meeting notes☆14Apr 5, 2016Updated 9 years ago
- Arya is a simple obfuscator for .NET binaries.☆37Dec 11, 2017Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Script for Forensic on Linux☆48Feb 1, 2016Updated 10 years ago
- [INACTIVE] Watch repositories star counts☆12Oct 17, 2016Updated 9 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Apr 1, 2016Updated 9 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- A Sublime Text package that provides enhanced syntax highlighting, completions, snippets & more for Jinja templates.☆18Mar 5, 2026Updated 2 weeks ago
- pivottablejs for air-gapped systems☆13Aug 14, 2024Updated last year
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 8 years ago
- A vim plugin that creates and auto-loads ctags, cscope, and pycscope database for you.☆15Jan 29, 2019Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Workshop for Hadoop Operations Best Practices☆10Feb 24, 2015Updated 11 years ago
- A pure Ruby library for parsing the XML out of an AndroidManifest.xml stored in an APK package☆16Aug 5, 2016Updated 9 years ago
- Awesome-Cellular-Hacking☆11Jul 9, 2019Updated 6 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- This is a list of companies that endorse Cal Newport's Deep Work approach.☆12Mar 13, 2026Updated last week
- iPython notebooks presented in rogue.ly/spy☆23Jul 26, 2014Updated 11 years ago