libnet / nemesisLinks
A command-line network packet crafting and injection utility
☆521Updated 2 years ago
Alternatives and similar repositories for nemesis
Users that are interested in nemesis are comparing it to the libraries listed below
Sorting:
- A framework for layer 2 attacks☆828Updated 2 years ago
- IPv6 attack toolkit☆1,148Updated 4 months ago
- DHCP exhaustion script written in python using scapy network library☆352Updated 2 months ago
- Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols☆494Updated 11 months ago
- mXtract - Memory Extractor & Analyzer☆591Updated 4 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆402Updated 8 years ago
- A Swiss army knife for your daily Linux network plumbing.☆1,382Updated 7 months ago
- dsniff is a collection of tools for network auditing and penetration testing.☆223Updated 15 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆361Updated 5 months ago
- Decept Network Protocol Proxy☆279Updated 3 years ago
- A keystroke / terminal logger for Linux.☆216Updated last year
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆167Updated 7 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆459Updated 2 weeks ago
- The IKE Scanner☆407Updated last year
- Modern tactical exploitation toolkit.☆855Updated 2 months ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆468Updated last year
- Visualize network topologies and collect graph statistics based on pcap files☆355Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆545Updated 8 months ago
- netdiscover☆403Updated 3 years ago
- network reconnaissance toolkit☆431Updated 7 years ago
- SSLStrip version to defeat HSTS☆323Updated 8 years ago
- Credentials catching honeypot☆387Updated last year
- The best way to scan for weak ssh passwords on your network☆619Updated 2 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- Bash post exploitation toolkit☆744Updated 2 years ago
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆419Updated 3 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Updated 9 years ago
- Automated Linux evil maid attack☆434Updated 10 years ago
- Network reconnaissance and vulnerability assessment tools.☆400Updated 4 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆616Updated 3 months ago