r00t-3xp10it / spoof_mac
change mac address without using macchanger (NetworkManager9 clone bug)
☆18Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for spoof_mac
- Samsung TV Denial of Service (DoS) Attack☆35Updated 8 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Optional plugins for MITMf☆15Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- ☆19Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- MS17-010☆12Updated 7 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆17Updated 8 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- PHP Phishing Framework☆28Updated 10 years ago
- Collection of Nmap scripts☆10Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 2 years ago