libnet / nemesisLinks
A command-line network packet crafting and injection utility
☆525Updated 2 years ago
Alternatives and similar repositories for nemesis
Users that are interested in nemesis are comparing it to the libraries listed below
Sorting:
- A framework for layer 2 attacks☆809Updated 2 years ago
- Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols☆491Updated 9 months ago
- mXtract - Memory Extractor & Analyzer☆592Updated 4 years ago
- IPv6 attack toolkit☆1,135Updated 2 months ago
- The IKE Scanner☆398Updated last year
- DHCP exhaustion script written in python using scapy network library☆352Updated 5 months ago
- A Swiss army knife for your daily Linux network plumbing.☆1,362Updated 5 months ago
- dsniff is a collection of tools for network auditing and penetration testing.☆215Updated 15 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆360Updated 2 months ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆403Updated 8 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆222Updated 8 years ago
- p0f unofficial git repo☆505Updated 6 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆655Updated last year
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- Nameserver DNS poisoning attacks made easy☆525Updated 8 years ago
- netdiscover☆404Updated 3 years ago
- SIP Security Assessment Framework for VoIP Pentesters. Presented at DEFCON, BlackHat & Offzone.☆416Updated 2 years ago
- Bash post exploitation toolkit☆743Updated 2 years ago
- Modern tactical exploitation toolkit.☆854Updated last week
- A keystroke / terminal logger for Linux.☆216Updated last year
- The best way to scan for weak ssh passwords on your network☆617Updated last year
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆165Updated 7 years ago
- Mallory - MiTM TCP and UDP Proxy☆322Updated 3 years ago
- Credentials catching honeypot☆384Updated last year
- SSLStrip version to defeat HSTS☆321Updated 8 years ago
- Decept Network Protocol Proxy☆281Updated 2 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆616Updated last month
- network reconnaissance toolkit☆431Updated 6 years ago
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆208Updated 7 years ago