mk-fg / tcp-connection-hijack-reset
Simple scapy-based tool to hijack and reset existing TCP connections
☆23Updated 12 years ago
Alternatives and similar repositories for tcp-connection-hijack-reset
Users that are interested in tcp-connection-hijack-reset are comparing it to the libraries listed below
Sorting:
- ☆36Updated 9 years ago
- SQLChop reverse http proxy module☆32Updated 9 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- Honeypot made in Python/Scapy. Support ARP, ICMP, Http and SSH☆26Updated 12 years ago
- eqgrp-auction decrypted☆12Updated 8 years ago
- This is a compilation of various shells that I had found in the wild.☆15Updated 11 years ago
- The python client of 360 Netlab whois database☆14Updated 6 years ago
- Vipasyin Webshell detector (golang)☆8Updated 10 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- ☆41Updated 8 years ago
- OpenFlow Honeypot☆23Updated 12 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 8 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- ☆31Updated 9 years ago
- ☆20Updated last year
- ☆16Updated 9 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- A remote access trojan over DNS☆95Updated 9 years ago
- IronBee Rules☆19Updated 11 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Updated 3 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated last year
- ☆44Updated last year
- Libnids is an implementation of an E-component of Network Intrusion Detection System. It emulates the IP stack of Linux 2.0.x. Libnids of…☆53Updated 9 years ago
- ☆15Updated 8 years ago
- A collection of shellcodes☆68Updated 12 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- passive dns collector☆10Updated 8 years ago
- Snort rules☆35Updated 6 years ago