r00t-3xp10it / netool-toolkitView external linksLinks
MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --
☆76Nov 25, 2016Updated 9 years ago
Alternatives and similar repositories for netool-toolkit
Users that are interested in netool-toolkit are comparing it to the libraries listed below
Sorting:
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- D-RAT SRC Extract☆12Dec 24, 2016Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆874Dec 28, 2018Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- transform your payload.exe into one fake word doc (.ppt)☆470Dec 8, 2019Updated 6 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆292Feb 28, 2018Updated 7 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Dec 9, 2019Updated 6 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Jul 31, 2024Updated last year
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆934May 28, 2025Updated 8 months ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- ☆12Sep 11, 2014Updated 11 years ago
- Massive arsenal of hacker tools...☆79Oct 30, 2017Updated 8 years ago
- The New Hacking Framework☆705Apr 5, 2021Updated 4 years ago
- miscellaneous handy pentesting tools☆63Jan 1, 2021Updated 5 years ago
- collection of articles/books about programing☆585Dec 20, 2023Updated 2 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Jun 5, 2023Updated 2 years ago
- Simple security surveillance script for linux distributions.☆59Jan 26, 2017Updated 9 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Dec 13, 2017Updated 8 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.