libnet / nemesis
A command-line network packet crafting and injection utility
☆507Updated last year
Alternatives and similar repositories for nemesis:
Users that are interested in nemesis are comparing it to the libraries listed below
- IPv6 attack toolkit☆1,064Updated 3 weeks ago
- A framework for layer 2 attacks☆752Updated last year
- A Swiss army knife for your daily Linux network plumbing.☆1,294Updated last month
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆398Updated 7 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆539Updated 11 months ago
- network reconnaissance toolkit☆422Updated 6 years ago
- SensePost's modified hostapd for wifi attacks.☆560Updated 6 months ago
- Modern tactical exploitation toolkit.☆841Updated 7 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆597Updated 9 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 4 months ago
- A keystroke / terminal logger for Linux.☆216Updated 7 months ago
- mXtract - Memory Extractor & Analyzer☆585Updated 3 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆163Updated 7 years ago
- The IKE Scanner☆370Updated 5 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆432Updated this week
- Modified hostapd to facilitate AP impersonation attacks☆503Updated 6 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆519Updated 3 years ago
- Decept Network Protocol Proxy☆275Updated 2 years ago
- Bash post exploitation toolkit☆726Updated last year
- Smart Install Exploitation Tool☆575Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 7 months ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆371Updated last year
- SSH man-in-the-middle tool☆1,645Updated 3 years ago
- Data exfiltration over DNS request covert channel☆858Updated 10 months ago
- Linux Memory Cryptographic Keys Extractor☆237Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆625Updated 3 years ago
- Ncrack network authentication tool☆1,108Updated 10 months ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆379Updated 2 years ago