r-richter / hyenae-ngLinks
Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms.
☆132Updated 2 years ago
Alternatives and similar repositories for hyenae-ng
Users that are interested in hyenae-ng are comparing it to the libraries listed below
Sorting:
- Advance Image Steganography☆132Updated 3 years ago
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- ☆99Updated 4 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Updated 4 months ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆110Updated 5 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- ☆99Updated 5 years ago
- mixed packet injector tool☆19Updated 5 years ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆63Updated 5 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- Botnet Simulation Framework☆78Updated 5 years ago
- Low Interaction Mobile Honeypot☆96Updated 7 months ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆214Updated last year
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆109Updated 5 years ago
- PENIOT: Penetration Testing Tool for IoT☆229Updated 3 years ago
- Python-Based Pentesting CLI Tool☆88Updated 3 years ago
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆210Updated last year
- An extensible application for penetration testers and software developers to decode/encode data into various formats.☆105Updated last year
- WireBug is a toolset for Voice-over-IP penetration testing☆174Updated 3 years ago
- Build a Mirai botnet from the source code.☆43Updated 6 years ago
- censors pose a threat to the entire Internet☆141Updated 4 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- A very fast and smart web directory and file enumeration tool written in C.☆141Updated 4 months ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Basic RDP honeypot script☆31Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆30Updated 4 years ago