r-richter / hyenae-ng
Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms.
☆127Updated last year
Related projects ⓘ
Alternatives and complementary repositories for hyenae-ng
- ☆90Updated 3 years ago
- XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.☆378Updated 2 months ago
- PENIOT: Penetration Testing Tool for IoT☆209Updated 2 years ago
- IoT and Operational Technology Honeypot☆105Updated last year
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆97Updated last year
- WITCH_CRAFT is a task automation tool for cybersecurity. It handles forensic research, OSINT, scanning, backups, data copying, and penetr…☆15Updated this week
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆107Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆117Updated 4 months ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆119Updated 2 years ago
- A very fast and smart web directory and file enumeration tool written in C.☆135Updated 4 years ago
- censors pose a threat to the entire Internet☆132Updated 3 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆98Updated 3 months ago
- Devkit for building Metasploit-like consoles☆236Updated 4 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆52Updated 2 years ago
- A WLAN red team framework.☆142Updated last month
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆247Updated 2 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆75Updated last year
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆201Updated 4 months ago
- service location protocol amplified denial of service attack verification tool☆16Updated last year
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆62Updated 2 years ago
- Advance Image Steganography☆132Updated 2 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆143Updated 2 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆220Updated last year
- the only php webshell you need.☆221Updated 7 months ago
- Windows Credentials Editor v1.3beta☆106Updated 5 years ago
- A web hacking toolkit (docker image).☆163Updated last year
- Windows offline filesystem hacking tool for Linux☆97Updated 2 years ago