clayball / Dissembling-FerretLinks
Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.
☆13Updated 8 years ago
Alternatives and similar repositories for Dissembling-Ferret
Users that are interested in Dissembling-Ferret are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 15 years ago
- ☆40Updated 7 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- ☆25Updated 10 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- ☆16Updated 9 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Normalizer for honeypot data.☆46Updated 10 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago