robertdavidgraham / ferret
A continuation of my 'ferret' project that extracts useful information from networks.
☆23Updated 10 years ago
Alternatives and similar repositories for ferret:
Users that are interested in ferret are comparing it to the libraries listed below
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- A proxy server for cookie sidejacking. Works with 'ferret'.☆54Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- See here:☆42Updated 12 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- A collection of shellcodes☆67Updated 12 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- ArchPwn security linux live project☆19Updated 14 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- ☆15Updated 8 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- python client/server keystroke logger☆21Updated 12 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- ☆27Updated 7 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Popping boxes with Nmap☆18Updated 12 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago