mushorg / oschameleonLinks
OS Fingerprint Obfuscation for modern Linux Kernels
☆77Updated last year
Alternatives and similar repositories for oschameleon
Users that are interested in oschameleon are comparing it to the libraries listed below
Sorting:
- A Network Inspection Tool☆82Updated 8 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 4 years ago
- A warehouse for your malware☆135Updated last month
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Subdomain Analyzer☆77Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- VirusTotal tools☆92Updated 5 years ago
- Honeypot (Dionaea and kippo) setup script☆83Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- YAPDNS☆39Updated 10 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Rogue AP killer☆92Updated 7 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 12 years ago
- ☆50Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Updated 9 years ago
- A tool for netpens.☆37Updated 6 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago