libnet / nemesis
A command-line network packet crafting and injection utility
☆510Updated last year
Alternatives and similar repositories for nemesis:
Users that are interested in nemesis are comparing it to the libraries listed below
- dsniff is a collection of tools for network auditing and penetration testing.☆199Updated 14 years ago
- network reconnaissance toolkit☆423Updated 6 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- A Swiss army knife for your daily Linux network plumbing.☆1,299Updated 2 months ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- A framework for layer 2 attacks☆757Updated last year
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 5 months ago
- SensePost's modified hostapd for wifi attacks.☆563Updated 7 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆596Updated 10 months ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 2 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆501Updated 7 years ago
- mXtract - Memory Extractor & Analyzer☆589Updated 3 years ago
- DHCP exhaustion script written in python using scapy network library☆340Updated 10 months ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆164Updated 7 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- Modern tactical exploitation toolkit.☆842Updated 8 months ago
- Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.☆562Updated 2 years ago
- Nameserver DNS poisoning attacks made easy☆519Updated 8 years ago
- IPv6 attack toolkit☆1,074Updated last month
- netdiscover☆386Updated 2 years ago
- Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols☆474Updated last month
- Smart Install Exploitation Tool☆575Updated 3 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- The IKE Scanner☆375Updated 6 months ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆207Updated 6 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- Ncrack network authentication tool☆1,119Updated 11 months ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆308Updated 3 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆538Updated last year
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆518Updated 3 years ago