rafael-santiago / pig
A Linux packet crafting tool.
☆462Updated 3 years ago
Related projects: ⓘ
- Haka runtime☆445Updated 6 years ago
- All your IPs are belong to us.☆667Updated 6 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆372Updated 2 years ago
- Sandboxed Execution Environment☆811Updated 3 years ago
- A tool to fingerprint SSL/TLS servers☆263Updated 2 years ago
- A tool that provides a basic SQL-frontend to PCAP-files☆393Updated 2 weeks ago
- Probably one of the smallest SSL MITM proxies you can make☆181Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆817Updated 6 years ago
- A Swiss army knife for your daily Linux network plumbing.☆1,213Updated 3 weeks ago
- A command-line network packet crafting and injection utility☆491Updated 11 months ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆987Updated 3 years ago
- An intercepting proxy for web application testing☆407Updated 5 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆454Updated 11 months ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆419Updated last year
- Malicious HTTP traffic explorer☆707Updated last year
- - An Exploit Dev Swiss Army Knife.☆683Updated 2 years ago
- Nscan: Fast internet-wide scanner☆527Updated 9 years ago
- Protect your Wireless Network from Evil Access Points!☆180Updated last year
- Current development of SSLyze now takes place on a separate repository☆644Updated 9 years ago
- SSH man-in-the-middle tool☆1,609Updated 3 years ago
- Deprecated - MIG Memory Forensic library☆388Updated 2 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆429Updated 6 years ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆540Updated 8 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,677Updated 2 years ago
- Recon, Subdomain Bruting, Zone Transfers☆227Updated 8 years ago
- Tools for auditing WAFS☆456Updated 3 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Updated 7 years ago
- Automated Linux evil maid attack☆418Updated 8 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆623Updated 2 months ago