epinna / Stegosip
TCP tunnel over RTP/SIP
☆97Updated 4 years ago
Alternatives and similar repositories for Stegosip:
Users that are interested in Stegosip are comparing it to the libraries listed below
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆85Updated 6 years ago
- ☆26Updated 7 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆105Updated 8 years ago
- ☆53Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆82Updated 5 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 4 years ago
- SCTP network scanner for discovery and security☆93Updated 3 years ago
- VOIP Security Audit Framework☆108Updated 7 years ago
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- Advanced Netstat Using Python For Windows☆46Updated 7 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆21Updated 2 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- Pentesting framework using Node.js powers, focused in VoIP.☆261Updated 7 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Updated 7 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆68Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆118Updated 7 years ago
- Mikrotik SMB buffer overflow exploit☆64Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- ☆47Updated 9 years ago
- A curated list of rootkits found on Github and other sites.☆62Updated 7 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆75Updated 4 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆52Updated 6 years ago