dlrobertson / sylkieView external linksLinks
IPv6 address spoofing with the Neighbor Discovery Protocol
☆53Jul 15, 2018Updated 7 years ago
Alternatives and similar repositories for sylkie
Users that are interested in sylkie are comparing it to the libraries listed below
Sorting:
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54May 15, 2021Updated 4 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 5 months ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Advanced Hash Manipulation☆175Oct 14, 2019Updated 6 years ago
- Tools for information gathering☆355May 20, 2024Updated last year
- A Scanner for M3UA protocol to detect Sigtran supporting nodes☆63May 16, 2018Updated 7 years ago
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 10 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆120Apr 24, 2019Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Droidefense: Advance Android Malware Analysis Framework☆478Dec 14, 2022Updated 3 years ago
- Allows the creation and management of a newsletter to site/group members☆15Updated this week
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- Inject malicious code into *.debs☆283Apr 26, 2022Updated 3 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Nov 17, 2017Updated 8 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Scripts for creating GNU Radio Live SDR Environment.☆29Aug 28, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Jan 12, 2023Updated 3 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Jun 24, 2018Updated 7 years ago