hackerschoice / thc-arpmitm
ARP Man-in-the-Middle tool
☆28Updated last month
Alternatives and similar repositories for thc-arpmitm:
Users that are interested in thc-arpmitm are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- Collection of cracked malware☆14Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- ☆28Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 10 months ago
- Format string exploit generation☆10Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Some stuff about telecom security☆14Updated 8 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Tool useful to discover services behind unknown ports☆13Updated 3 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆12Updated 8 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆18Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆21Updated 7 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 7 years ago