r-richter / hyenae-ngView external linksLinks
Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms.
☆132May 7, 2023Updated 2 years ago
Alternatives and similar repositories for hyenae-ng
Users that are interested in hyenae-ng are comparing it to the libraries listed below
Sorting:
- Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack s…☆24Jun 24, 2020Updated 5 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Sep 28, 2025Updated 4 months ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- ☆13Mar 1, 2024Updated last year
- We all know about the famous spyse.com this python3 scripts scrounges subdomains without the api from spyse cybersecurity search engine☆10May 13, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆62Jun 12, 2025Updated 8 months ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- ☆30Jul 28, 2024Updated last year
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26May 8, 2020Updated 5 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- Pwnspoof repository☆264Sep 8, 2023Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Mar 18, 2023Updated 2 years ago
- Scripts for building OpenVPN TAP adapter used in ProtonVPN Windows app☆19Jan 16, 2020Updated 6 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 2 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 2 months ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Remote Administration Tool For Windows☆13Apr 27, 2018Updated 7 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Sep 7, 2023Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆129Jan 23, 2021Updated 5 years ago
- ☆100Nov 10, 2021Updated 4 years ago
- Website defacement attack detection with deep learning☆62Jan 15, 2025Updated last year
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- TsTeleport Dynamic Virtual Channel Example Experimentation☆15Feb 2, 2014Updated 12 years ago
- ☆23Nov 29, 2023Updated 2 years ago