clayball / Dissembling-FerretLinks
Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.
☆13Updated 8 years ago
Alternatives and similar repositories for Dissembling-Ferret
Users that are interested in Dissembling-Ferret are comparing it to the libraries listed below
Sorting:
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- ☆25Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- Masscan integrated with Shodan API☆43Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆35Updated 8 years ago
- ANWI - All New Wireless IDS☆28Updated 2 weeks ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- ☆40Updated 7 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago