robertdavidgraham / ferretLinks
A continuation of my 'ferret' project that extracts useful information from networks.
☆23Updated 11 years ago
Alternatives and similar repositories for ferret
Users that are interested in ferret are comparing it to the libraries listed below
Sorting:
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 9 years ago
- A proxy server for cookie sidejacking. Works with 'ferret'.☆56Updated 9 years ago
- lulz: automated webstalking tool☆54Updated 9 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 9 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- MiTM tools and scripts☆19Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- ☆28Updated 9 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Updated 3 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 15 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- log file scrubber☆15Updated 7 years ago
- ☆54Updated 8 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago