secdev / etherpuppetLinks
Clone network interface from one host as a tap interface on another host
☆61Updated 5 years ago
Alternatives and similar repositories for etherpuppet
Users that are interested in etherpuppet are comparing it to the libraries listed below
Sorting:
- Complete SMS packet manipulation☆114Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated 2 years ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated last year
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- ☆23Updated last year
- Network Tools☆34Updated 2 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16Updated 8 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated last week
- VoIPShark is a open source VoIP Analysis Platform which will allow people to analyze live or stored VoIP traffic, easily decrypt encrypte…☆90Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆37Updated last year
- THC "R U There" network discovery tool☆29Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Packet communication investigator☆91Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Pattern recognition for hosts, services, and content☆14Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- Open YARA scan- and search engine☆25Updated 10 months ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- CITL's static analysis engine for native code artifacts☆20Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago