evilsocket / spycast
A crossplatform mDNS enumeration tool.
☆347Updated 2 years ago
Alternatives and similar repositories for spycast:
Users that are interested in spycast are comparing it to the libraries listed below
- A fast and secure multi protocol honeypot.☆314Updated 2 years ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆325Updated 6 months ago
- Credentials Dumper for Linux using eBPF☆1,132Updated 6 months ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆785Updated 11 months ago
- eBPF Port Knocking Tool☆232Updated last year
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust☆347Updated 3 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆786Updated 2 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆375Updated last year
- Utility to find hidden Linux kernel modules☆144Updated 2 months ago
- The Token Stealer☆490Updated 2 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆221Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,185Updated last year
- Dangerously fast DNS/network/port scanner☆897Updated 2 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆552Updated 11 months ago
- tool for generating wordlists or extending an existing one using mutations.☆383Updated last year
- Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.☆783Updated last week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,068Updated 3 weeks ago
- reverse shell using curl☆205Updated 2 weeks ago
- NIST-based CVE lookup store and API powered by Rust.☆129Updated last month
- A sock, with a wire, so you can tunnel all you desire.☆282Updated last year
- it is very good☆505Updated 2 years ago
- Tricking shells into interactive mode when local PTY's are not available☆143Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,385Updated 2 years ago
- A simple python packer to easily bypass Windows Defender☆633Updated 2 years ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆292Updated this week
- zero-trust remote firewall instrumentation☆227Updated 8 months ago
- Fast and configurable TLS grabber focused on TLS based data collection.☆902Updated this week
- OS image for the PiRogue based on Debian 12☆154Updated 7 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆258Updated this week