evilsocket / eveLinks
(◍•﹏•) - Hi, I'm Eve
☆21Updated 7 years ago
Alternatives and similar repositories for eve
Users that are interested in eve are comparing it to the libraries listed below
Sorting:
- Popping boxes with Nmap☆18Updated 13 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- ☆15Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A web app scanner☆26Updated 11 years ago
- Fork of http://www.kismetwireless.net/☆28Updated 12 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 8 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago