clayball / Dissembling-FerretLinks
Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.
☆13Updated 8 years ago
Alternatives and similar repositories for Dissembling-Ferret
Users that are interested in Dissembling-Ferret are comparing it to the libraries listed below
Sorting:
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 8 years ago
- Express security essentials deployment for Linux Servers☆60Updated 5 years ago
- ☆16Updated 9 years ago
- ☆39Updated 7 years ago
- Masscan integrated with Shodan API☆44Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 6 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- Phishing Toolkit☆19Updated 7 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- The third open source piece of ransomware using bash☆15Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Exfiltrate files via DNS☆94Updated 12 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Automatically scans for malicious proxies.☆31Updated 10 years ago