IPsec IKEv1 PSK+XAUTH MitM attack daemon
☆23Mar 20, 2023Updated 3 years ago
Alternatives and similar repositories for fiked
Users that are interested in fiked are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ohrwurm is an RTP fuzzer. features some SIP parsing and RTCP suppressing.☆17Sep 30, 2010Updated 15 years ago
- SMTP Server Tester, by Alton Johnson (alton.jx@gmail.com)☆19Jul 3, 2015Updated 10 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- ☆10Sep 20, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- We all know about the famous spyse.com this python3 scripts scrounges subdomains without the api from spyse cybersecurity search engine☆10May 13, 2020Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/javasnoop☆27Jul 16, 2015Updated 10 years ago
- ☆15Sep 24, 2015Updated 10 years ago
- Record X11 keypress events to a log file☆27Mar 19, 2018Updated 8 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- ☆21Sep 5, 2016Updated 9 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- NmapSi4 is a complete Qt-based Gui with the design goals to provide a complete nmap interface for Users, in order to management all optio…☆43Jun 2, 2025Updated 10 months ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- ☆40Sep 5, 2013Updated 12 years ago
- ☆25Mar 22, 2021Updated 5 years ago
- davtest (improved)- Exploits WebDAV folders☆121Mar 7, 2023Updated 3 years ago
- Cymothoa is a backdooring tool, that inject backdoor's shellcode directly into running applications. Stealth and lightweight...☆18Aug 24, 2015Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Jul 17, 2017Updated 8 years ago
- Tranalyzer generates extended netflow-like flow statistics from large pcap files or extensive ethernet interface measurements. It is inte…☆18Nov 14, 2018Updated 7 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆14Jul 8, 2019Updated 6 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- testing123☆14Nov 23, 2024Updated last year
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- iPhone Backup Analyzer☆34Dec 7, 2012Updated 13 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Crack the verification hash of the encrypted payload of the Gauss Virus☆20Dec 25, 2021Updated 4 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- mixed packet injector tool☆20Dec 29, 2020Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago