r-richter / hyenae-ngLinks
Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms.
☆128Updated 2 years ago
Alternatives and similar repositories for hyenae-ng
Users that are interested in hyenae-ng are comparing it to the libraries listed below
Sorting:
- ☆96Updated 3 years ago
- IoT and Operational Technology Honeypot☆104Updated last year
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆99Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 11 months ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆226Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 2 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 2 years ago
- Python-Based Pentesting CLI Tool☆82Updated 2 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- A very fast and smart web directory and file enumeration tool written in C.☆141Updated 5 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆118Updated 2 weeks ago
- WITCHCRAFT is a cyberdeck toolkit built for runners who dive deep into the mesh. It’s your all-in-one rig for data-ghosting, ICE-breaking…☆36Updated 2 months ago
- Advance Image Steganography☆129Updated 3 years ago
- censors pose a threat to the entire Internet☆134Updated 3 years ago
- XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.☆449Updated last month
- PENIOT: Penetration Testing Tool for IoT☆221Updated 3 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆206Updated 10 months ago
- A network packet forensics tool for SSH☆252Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆109Updated 5 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆46Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆67Updated 5 years ago
- 3rd party (Sourceforge)☆36Updated 6 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- Incident Response - Fast suspicious file finder☆242Updated 3 years ago
- Extract passwords from memory with strace☆39Updated 3 years ago
- Ladon hacking Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MY…☆180Updated last year
- ☆10Updated 7 years ago
- Exploits project Hacking Command Center☆51Updated last year
- Forks git://git.debian.org/collab-maint/hping3.git☆45Updated 11 years ago