hackerschoice / thc-rutLinks
THC "R U There" network discovery tool
☆28Updated 5 years ago
Alternatives and similar repositories for thc-rut
Users that are interested in thc-rut are comparing it to the libraries listed below
Sorting:
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better☆36Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated 2 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 10 months ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Complete SMS packet manipulation☆113Updated 3 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- wordlists for password cracking☆28Updated 2 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- ☆46Updated 5 years ago
- ☆69Updated 9 months ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago