blackhatethicalhacking / snifferLinks
VoIPmonitor sniffer sources
☆20Updated 6 years ago
Alternatives and similar repositories for sniffer
Users that are interested in sniffer are comparing it to the libraries listed below
Sorting:
- A toolkit to attack Office365☆16Updated 6 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Updated 6 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆55Updated last year
- ☆25Updated 5 years ago
- ☆12Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Nmap Web Dashboard and Reporting☆34Updated 3 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆67Updated 7 years ago
- LinkedIn reconnaissance tool☆11Updated 6 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆68Updated 7 years ago
- ☆13Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆19Updated 6 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Updated 6 years ago
- HOCXSS (Cross Site Scripting)☆12Updated 5 years ago
- A Tool for Domain Flyovers☆18Updated 6 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Penetration Testing/Security Cheatsheets☆64Updated 10 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated 3 months ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Updated 7 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Updated 6 years ago