halit / isip
Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.
☆76Updated 9 years ago
Alternatives and similar repositories for isip:
Users that are interested in isip are comparing it to the libraries listed below
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- ☆22Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 8 years ago
- Code, commands, and chatter about Threat Hunting.☆35Updated 5 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- A curated list of rootkits found on Github and other sites.☆62Updated 7 years ago
- ☆84Updated 8 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 4 years ago
- ☆66Updated 7 years ago
- ☆47Updated 9 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- Slides from previous conference talks☆41Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆96Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Updated 7 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆53Updated 9 years ago
- A modular distributed penetration testing tool.☆42Updated 8 years ago
- Subdomain Analyzer☆76Updated 8 years ago
- Covert Channels for C2 Server☆17Updated 9 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- ☆64Updated 7 years ago
- ☆53Updated 7 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆43Updated 9 years ago