hackerschoice / thc-rutLinks
THC "R U There" network discovery tool
☆30Updated 5 years ago
Alternatives and similar repositories for thc-rut
Users that are interested in thc-rut are comparing it to the libraries listed below
Sorting:
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better☆38Updated 6 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- ☆52Updated last week
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 5 years ago
- Repository containing many useful scripts☆75Updated 3 years ago
- Creates dictionaries based on Wikipedia titles☆63Updated 6 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated last year
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆102Updated 2 years ago
- ARP Man-in-the-Middle tool☆31Updated last year
- Miscellaneous analysis tools☆25Updated 10 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 5 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Updated 6 years ago
- A script to automate Jenkins credential store decryption☆17Updated 7 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- test SSL/TLS clients how secure they are☆26Updated 4 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago