eclipsesrcool / faucetLinks
FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 and IPv6 routing.
β14Updated 6 years ago
Alternatives and similar repositories for faucet
Users that are interested in faucet are comparing it to the libraries listed below
Sorting:
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)β13Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Frameworkβ50Updated 6 years ago
- This is the ToRat server, a part of the ToRat Project.β23Updated 6 years ago
- Dependencies for Veil 3β17Updated 8 years ago
- pentest toolboxβ28Updated 3 years ago
- A simple Golang program to collect proxiesβ13Updated 6 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.β27Updated 9 years ago
- Windows Remote Administration Tool via Telegramβ35Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLYβ23Updated 7 years ago
- A simple and cross-platform Remote Administration Tool written in Rubyβ15Updated 8 years ago
- edge --> powerpoint --> remote-file --> shellβ12Updated 6 years ago
- Port scanning and domain utility.β30Updated 8 years ago
- Example of malicious codes for educational purpose, don't make shit with thatβ28Updated 6 years ago
- Mutation Of VΔ±rusesβ48Updated 10 years ago
- Scripts and tools for ISM hackingβ16Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C serverβ17Updated 8 years ago
- SkyRAT - Powershell Remote Administration Toolβ33Updated 7 years ago
- w3af packaging for Kali distributionβ26Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β21Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershellβ21Updated last year
- PowerShell Reverse HTTPs Shellβ29Updated 11 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbeβ¦β47Updated 6 years ago
- flood area with fake essidsβ20Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systemsβ28Updated 7 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.β27Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sessβ¦β22Updated 7 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.β77Updated 7 years ago
- This is the ToRat client, a part of the ToRat Project.β26Updated 6 years ago
- Transplant adore rootkit for Android platform.β37Updated 11 years ago
- Honeypot for router backdoor (TCP 32764)β19Updated 11 years ago