chadillac / mdns_recon
Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries targeting their unicast addresses, including requests from their WAN interface. These daemons could be leveraged by attackers for sensitive information disclosure and potentially used in DDoS campaigns for reflec…
☆83Updated 2 years ago
Related projects: ⓘ
- ☆55Updated 9 years ago
- DNS zone transfer research☆57Updated 7 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- IPV6 MITM attack tool☆90Updated 11 years ago
- A collection of code snippets used in blog posts.☆54Updated 4 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆120Updated 5 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆104Updated 9 years ago
- DHCP option injector☆38Updated 4 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆92Updated 3 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Lootbox downloads open directories shared on Twitter.☆36Updated 3 years ago
- A tool for netpens.☆29Updated 5 years ago
- Smart Install Client Scanner☆61Updated 4 years ago
- tundeep☆42Updated 5 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated last year
- ☆48Updated 8 years ago
- ☆81Updated this week
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 5 years ago
- Rogue AP killer☆86Updated 6 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆42Updated 9 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆51Updated 6 years ago
- ☆20Updated this week
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆59Updated 4 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 7 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆67Updated 8 years ago
- Packet-o-matic NG !☆64Updated last month
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆49Updated 5 years ago