nottinghamprisateam / pyersiniaLinks
Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de datos
☆61Updated 5 years ago
Alternatives and similar repositories for pyersinia
Users that are interested in pyersinia are comparing it to the libraries listed below
Sorting:
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- Subdomain Analyzer☆77Updated 8 years ago
- Analyse SQL injection attempts in web server logs☆82Updated 8 years ago
- Windows Offline Common Password Hash Checker☆29Updated 9 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- Masscan integrated with Shodan API☆43Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Updated 10 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 10 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- VOIP Security Audit Framework☆109Updated 7 years ago
- AutoBrowser Screenshot☆49Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- A modular distributed penetration testing tool.☆41Updated 9 years ago
- Search exploits in multiple exploit databases!☆86Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- ☆54Updated 9 years ago
- ☆47Updated 10 years ago