iphelix / dnschefLinks
DNSChef - DNS proxy for Penetration Testers and Malware Analysts
☆1,034Updated last year
Alternatives and similar repositories for dnschef
Users that are interested in dnschef are comparing it to the libraries listed below
Sorting:
- socks4 reverse proxy for penetration testing☆631Updated 7 years ago
- SMBMap is a handy SMB enumeration tool☆2,001Updated last week
- pwning IPv4 via IPv6☆1,871Updated last year
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,483Updated 2 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆577Updated 3 years ago
- Python PTY backdoors - full PTY or nothing!☆749Updated 11 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,444Updated last month
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,390Updated this week
- A framework for layer 2 attacks☆821Updated 2 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,138Updated 2 months ago
- A default credential scanner.☆1,500Updated 6 months ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆604Updated 10 years ago
- Bash post exploitation toolkit☆744Updated 2 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,082Updated 4 years ago
- A Nmap XSL implementation with Bootstrap.☆963Updated 2 years ago
- Data exfiltration over DNS request covert channel☆881Updated last year
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆981Updated 8 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Updated 5 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567Updated last year
- Smart Install Exploitation Tool☆590Updated 4 years ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,103Updated 3 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,302Updated 3 years ago
- A DNS rebinding attack framework.☆1,239Updated last month
- A Python Package for Data Exfiltration☆804Updated 6 months ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,544Updated 3 years ago
- Fast SNMP Scanner☆676Updated 4 months ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆527Updated last year
- Pop shells like a master.☆1,484Updated 6 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆640Updated 2 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆729Updated 6 years ago