robertdavidgraham / ferret
A continuation of my 'ferret' project that extracts useful information from networks.
☆23Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for ferret
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 7 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 6 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- w3af packaging for Kali distribution☆26Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆19Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 8 years ago
- A proxy server for cookie sidejacking. Works with 'ferret'.☆55Updated 8 years ago
- Identifies Bluetooth Low-energy devices☆15Updated 4 years ago
- ssh session type for metasploit☆97Updated last year
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago