secdev / etherpuppetLinks
Clone network interface from one host as a tap interface on another host
☆59Updated 4 years ago
Alternatives and similar repositories for etherpuppet
Users that are interested in etherpuppet are comparing it to the libraries listed below
Sorting:
- Complete SMS packet manipulation☆113Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- A Passive SSH back-end and scanner.☆102Updated 3 weeks ago
- Network Tools☆32Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Exploit, Malware and Vulnerability Scoring Application☆13Updated last year
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆71Updated last year
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- ☆20Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆73Updated last year
- Remote / Onsite Security Assessment Jumpkit☆39Updated last year
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆49Updated 5 months ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 5 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- VoIPShark is a open source VoIP Analysis Platform which will allow people to analyze live or stored VoIP traffic, easily decrypt encrypte…☆86Updated 5 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Updated 2 years ago
- tshark + ELK analytics virtual machine☆67Updated 5 months ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆28Updated last year
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- ☆48Updated 5 months ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Fast lookup server for NSRL and other hash database used in digital forensic☆45Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago