puniaze / PortDogView external linksLinks
☆135Sep 14, 2015Updated 10 years ago
Alternatives and similar repositories for PortDog
Users that are interested in PortDog are comparing it to the libraries listed below
Sorting:
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Apr 20, 2020Updated 5 years ago
- Subdomain Analyzer☆77Apr 18, 2017Updated 8 years ago
- Plecost - Wordpress finger printer Tool☆347Mar 1, 2023Updated 2 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆789Sep 30, 2020Updated 5 years ago
- an open source ransomware honeypot☆908Jan 27, 2016Updated 10 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 9 months ago
- Akamai Reflective DDoS Tool - Attack the origin host behind the Akamai Edge hosts and DDoS protection offered by Akamai services.☆263Jun 25, 2020Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 9 years ago
- Network Attack Tool☆1,491May 1, 2023Updated 2 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,346Nov 16, 2018Updated 7 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- a MITM attack tool☆85Sep 9, 2015Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,384Jun 17, 2022Updated 3 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- ☆536Feb 3, 2026Updated last week
- Find your wireless network password in Windows , Linux and Mac OS☆357Nov 5, 2020Updated 5 years ago
- SpeedPhishing Framework☆448Aug 8, 2019Updated 6 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆353Jan 12, 2023Updated 3 years ago
- minimal script to help find script into the nse database☆133Jul 10, 2018Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,733Feb 3, 2022Updated 4 years ago
- Probably one of the smallest SSL MITM proxies you can make☆183Aug 26, 2015Updated 10 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 6 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- ☆19Feb 21, 2015Updated 10 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 3 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Sep 19, 2016Updated 9 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago