avicoder / SnifferLinks
python packet sniffer
☆11Updated 8 years ago
Alternatives and similar repositories for Sniffer
Users that are interested in Sniffer are comparing it to the libraries listed below
Sorting:
- A simple python packet sniffer and manipulation tool for linux☆18Updated 10 years ago
- Python backdoor that uses http post/get requests to communicate☆42Updated 9 years ago
- Download exploits from exploit-db.com☆47Updated 10 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Updated 8 years ago
- Various pentest scripts☆14Updated 11 years ago
- ☆16Updated 5 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21Updated 8 years ago
- Reverse Shell with Python 3☆26Updated 5 years ago
- Create Basic SSH Honeypot With Python☆28Updated 9 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- Scripts used for phishing campaigns☆14Updated 11 years ago
- A simple keylogger made in python☆16Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 8 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Updated 12 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Tiny WiFi sniffer with Scapy for MAC OS X☆22Updated 11 years ago
- apbleed☆24Updated 11 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last year
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- Chef repository for pentesting tools☆13Updated 8 years ago
- ☆15Updated 11 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 3 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Updated 9 years ago
- Build a search engine from nmap XML files☆20Updated 11 years ago
- Hacking as per the book☆36Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago