exploitprotocol / DNS-SnifferLinks
It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.
☆18Updated 11 years ago
Alternatives and similar repositories for DNS-Sniffer
Users that are interested in DNS-Sniffer are comparing it to the libraries listed below
Sorting:
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Updated 12 years ago
- ☆16Updated 9 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- ☆11Updated 7 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- ☆20Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Env Scraper for Linux Post Exploitation☆9Updated 7 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- Some Of Huawei Routers Exploits☆13Updated 8 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 12 years ago
- ☆20Updated last year
- ☆47Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- "HeaderScan" Burp Plugin☆16Updated 11 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- ☆15Updated 8 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago