kamorin / DHCPig
DHCP exhaustion script written in python using scapy network library
☆339Updated 10 months ago
Alternatives and similar repositories for DHCPig:
Users that are interested in DHCPig are comparing it to the libraries listed below
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆308Updated 3 years ago
- SpeedPhishing Framework☆444Updated 5 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆193Updated 6 years ago
- The IKE Scanner☆373Updated 6 months ago
- SSLStrip version to defeat HSTS☆316Updated 7 years ago
- Modified hostapd to facilitate AP impersonation attacks☆505Updated 6 years ago
- Scans for accessibility tools backdoors via RDP☆337Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- IPv6 attack toolkit☆1,073Updated last month
- A command-line network packet crafting and injection utility☆510Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆287Updated 4 months ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆264Updated 11 years ago
- SensePost's modified hostapd for wifi attacks.☆562Updated 7 months ago
- War Child denial of service testing suite☆122Updated 7 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆497Updated 5 years ago
- Protect your Wireless Network from Evil Access Points!☆180Updated last year
- Offensive DNS server☆316Updated 3 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆398Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆370Updated last year
- A framework for layer 2 attacks☆756Updated last year
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆283Updated 7 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 5 months ago
- BlackNurse attack PoC☆172Updated 8 years ago
- Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols☆473Updated last month
- Automated Linux evil maid attack☆426Updated 9 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆204Updated last year
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Wireless Probe Requests Sniffer☆189Updated 2 years ago
- ☆603Updated 5 months ago
- Framework for Man-In-The-Middle attacks☆185Updated 8 years ago