r00t-3xp10it / spoof_mac
change mac address without using macchanger (NetworkManager9 clone bug)
☆18Updated 8 years ago
Alternatives and similar repositories for spoof_mac:
Users that are interested in spoof_mac are comparing it to the libraries listed below
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆18Updated 8 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Search bing with python☆12Updated 10 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆32Updated 8 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- pen testing scripts☆9Updated 3 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- Metasploit_postgresql_database_connection_fix☆12Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆18Updated 7 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Software exploitation training material☆15Updated 7 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago