rflynn / lanmap2
builds database/visualizations of LAN structure from passively sifted information
☆147Updated 10 years ago
Related projects: ⓘ
- ☆90Updated this week
- ☆85Updated this week
- ☆80Updated this week
- proxy poc implementation of STARTTLS stripping attacks☆166Updated 2 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 7 years ago
- ☆47Updated 8 years ago
- Risu is Nessus parser, that converts the generated reports into a ActiveRecord database, this allows for easy report generation and vulne…☆63Updated last month
- Store Burp data and collaborate via git☆54Updated 4 years ago
- ☆145Updated this week
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆59Updated 4 years ago
- Check UNIX/Linux systems for privilege escalation☆121Updated 8 years ago
- ☆76Updated this week
- Simple install script for Snort/Bro IDS with JSON logging on FreeBSD☆18Updated 8 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆17Updated 7 years ago
- Bash-completion script for Nmap☆68Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆81Updated 7 years ago
- HTTP Header Analysis Vulnerability Tool☆113Updated 3 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆63Updated 9 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- ☆23Updated this week
- ☆75Updated this week
- Search exploits in multiple exploit databases!☆80Updated 3 years ago
- Cartero - Social Engineering Framework☆170Updated 4 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆24Updated 10 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 7 years ago
- A Python framework for script filing and task sequencing☆26Updated 4 years ago
- ☆103Updated this week
- A Proof of Concept for the POODLE vulnerability in SSLv3☆76Updated 8 years ago
- ☆186Updated this week
- Convert 802.11 Packet Traces to XML and SQLITE Format☆65Updated 9 years ago