hackerschoice / thc-arpmitm
ARP Man-in-the-Middle tool
☆28Updated 2 months ago
Alternatives and similar repositories for thc-arpmitm:
Users that are interested in thc-arpmitm are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 11 months ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 4 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- ☆28Updated 9 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- Realtek RTL8814AU USB Wi-Fi driver☆8Updated 7 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- ☆17Updated last year
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- ☆15Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago