libnet / nemesis
A command-line network packet crafting and injection utility
☆513Updated last year
Alternatives and similar repositories for nemesis
Users that are interested in nemesis are comparing it to the libraries listed below
Sorting:
- A framework for layer 2 attacks☆771Updated last year
- Decept Network Protocol Proxy☆276Updated 2 years ago
- A Swiss army knife for your daily Linux network plumbing.☆1,316Updated last month
- IPv6 attack toolkit☆1,083Updated 3 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆669Updated last year
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆207Updated 6 years ago
- Modern tactical exploitation toolkit.☆848Updated 10 months ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆163Updated 7 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated 11 months ago
- The IKE Scanner☆377Updated 8 months ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆399Updated 7 years ago
- dsniff is a collection of tools for network auditing and penetration testing.☆208Updated 14 years ago
- netdiscover☆388Updated 2 years ago
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆370Updated 3 years ago
- network reconnaissance toolkit☆421Updated 6 years ago
- A keystroke / terminal logger for Linux.☆216Updated 10 months ago
- fireELF - Fileless Linux Malware Framework☆667Updated 6 years ago
- A Linux packet crafting tool.☆468Updated 4 years ago
- Nameserver DNS poisoning attacks made easy☆523Updated 8 years ago
- Bash post exploitation toolkit☆731Updated last year
- Smart Install Exploitation Tool☆580Updated 3 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆576Updated 7 years ago
- A network packet forensics tool for SSH☆253Updated 4 years ago
- DHCP exhaustion script written in python using scapy network library☆342Updated 11 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 7 months ago
- DNS Rebinding Exploitation Framework☆488Updated 4 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- Automated Linux evil maid attack☆427Updated 9 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated 2 weeks ago