Passive DHCP fingerprinting implementation
☆52Jul 12, 2016Updated 9 years ago
Alternatives and similar repositories for dhcpf
Users that are interested in dhcpf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- DHCP option injector☆42Jul 7, 2020Updated 5 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- ☆73Oct 15, 2014Updated 11 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- A Network Inspection Tool☆82Oct 13, 2017Updated 8 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Network based protocol fuzzer☆74Feb 17, 2022Updated 4 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆46Jul 2, 2016Updated 9 years ago
- Windows设备驱动开发 光盘(示例代码)☆10Jan 14, 2013Updated 13 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆10Nov 19, 2015Updated 10 years ago
- NDIS5/NDIS6 filter driver based simple firewall and static (1x1) NAT engine for Windows 7/8/10☆26Mar 20, 2023Updated 3 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago