chokepoint / pytinydns
PYTinyDNS
☆54Updated 10 years ago
Alternatives and similar repositories for pytinydns:
Users that are interested in pytinydns are comparing it to the libraries listed below
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆93Updated 8 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- observation camera honeypot☆50Updated 9 years ago
- YAPDNS☆39Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆60Updated 9 years ago
- Telnet Honeypot☆160Updated 5 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Updated 7 years ago
- A python based https remote access trojan for penetration testing☆85Updated 9 years ago
- ☆9Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- ☆16Updated 10 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- Web Sight Back-end Community Edition☆42Updated 2 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆20Updated 9 years ago
- BlackNurse attack PoC☆170Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 8 years ago
- Filet-O-Firewall Vulnerability PoC☆60Updated 9 years ago
- a MITM attack tool☆84Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆86Updated 9 years ago