chokepoint / pytinydnsLinks
PYTinyDNS
☆53Updated 11 years ago
Alternatives and similar repositories for pytinydns
Users that are interested in pytinydns are comparing it to the libraries listed below
Sorting:
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- Mass scanning and fuzzing library☆48Updated 7 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆119Updated 5 years ago
- YAPDNS☆39Updated 10 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆200Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆61Updated 9 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- ☆39Updated 8 years ago
- ☆129Updated 10 years ago
- ☆135Updated 9 years ago
- Introbackdoors☆50Updated 8 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Updated 2 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 6 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Public repository for improvements to the EXTRABACON exploit☆162Updated 8 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 9 years ago
- a MITM attack tool☆85Updated 9 years ago