"Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios
☆25Aug 17, 2014Updated 11 years ago
Alternatives and similar repositories for bnat
Users that are interested in bnat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- An attempt to run a MirageOS unikernel, built with Solo5, running in Qemu, on a Raspberry Pi 3☆11Mar 12, 2016Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- Syscall Firewalls for VM Isolation☆11May 31, 2017Updated 8 years ago
- SSL man-in-the-middle tool targeting iOS devices < 4.3.5☆37Aug 24, 2011Updated 14 years ago
- HTTP framework☆48Aug 29, 2017Updated 8 years ago
- An example Mirage unikernel that runs as a Qubes AppVM☆23Nov 25, 2020Updated 5 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated 2 months ago
- Dll Injection and Code injection sample☆13Mar 10, 2015Updated 11 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 10 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- ☆84Apr 18, 2017Updated 8 years ago
- Ssh-agent unikernel for QubesOS☆23Dec 12, 2022Updated 3 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆19Aug 28, 2021Updated 4 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- trivial transparent SMTP proxy☆13Dec 6, 2022Updated 3 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago