redcode-labs / YASLinks
Yet Another Sniffer for monitoring network traffic
☆85Updated 4 years ago
Alternatives and similar repositories for YAS
Users that are interested in YAS are comparing it to the libraries listed below
Sorting:
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- An epic web shell☆84Updated last week
- Fast and intuitive manager for multiple reverse shells☆85Updated 6 months ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆29Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- List of Awesome Offensive Tools written in GO☆202Updated 6 years ago
- Cryptovenom: The Cryptography Swiss Army Knife☆1Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- A small cli utility for interacting with Hack the Box☆35Updated 2 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago