libnet / nemesisLinks
A command-line network packet crafting and injection utility
☆520Updated last year
Alternatives and similar repositories for nemesis
Users that are interested in nemesis are comparing it to the libraries listed below
Sorting:
- A framework for layer 2 attacks☆796Updated 2 years ago
- dsniff is a collection of tools for network auditing and penetration testing.☆215Updated 15 years ago
- mXtract - Memory Extractor & Analyzer☆593Updated 3 years ago
- DHCP exhaustion script written in python using scapy network library☆349Updated 3 months ago
- IPv6 attack toolkit☆1,123Updated this week
- A Swiss army knife for your daily Linux network plumbing.☆1,350Updated 3 months ago
- Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols☆483Updated 7 months ago
- A keystroke / terminal logger for Linux.☆216Updated last year
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆401Updated 7 years ago
- The IKE Scanner☆385Updated last year
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆605Updated last year
- A Linux packet crafting tool.☆469Updated 4 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆220Updated 8 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆447Updated this week
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 3 weeks ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆163Updated 7 years ago
- SSLStrip version to defeat HSTS☆319Updated 7 years ago
- Modern tactical exploitation toolkit.☆850Updated last year
- Bash post exploitation toolkit☆741Updated 2 years ago
- netdiscover☆402Updated 2 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- network reconnaissance toolkit☆428Updated 6 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆645Updated 4 years ago
- Smart Install Exploitation Tool☆583Updated 3 years ago
- Decept Network Protocol Proxy☆277Updated 2 years ago
- Automated Linux evil maid attack☆431Updated 9 years ago
- Sockstress (TCP DoS) implementation.☆208Updated last year
- p0f unofficial git repo☆500Updated 6 years ago
- Mallory - MiTM TCP and UDP Proxy☆321Updated 3 years ago