r-richter / hyenae-ngLinks
Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms.
☆128Updated 2 years ago
Alternatives and similar repositories for hyenae-ng
Users that are interested in hyenae-ng are comparing it to the libraries listed below
Sorting:
- Advance Image Steganography☆131Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆99Updated last month
- ☆98Updated 3 years ago
- IoT and Operational Technology Honeypot☆104Updated last year
- A very fast and smart web directory and file enumeration tool written in C.☆143Updated last week
- extensible exploitation framework shipped on a modular multi-tasking architecture☆77Updated 2 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆109Updated 5 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆105Updated 5 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 5 years ago
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆30Updated 2 years ago
- ☆101Updated 5 years ago
- Cobalt Strike 4.4 Full cracked☆20Updated 3 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆168Updated 3 years ago
- Python-Based Pentesting CLI Tool☆85Updated 2 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆52Updated 3 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆210Updated last year
- All Security Resource Collections Repos That I Published.☆124Updated 5 years ago
- Unpacked tools of CQAcademy☆110Updated 6 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated last year
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 5 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8.☆126Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Custom Metasploit logos☆54Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Perform automated network reconnaissance scans☆234Updated 2 years ago