secdev / etherpuppet
Clone network interface from one host as a tap interface on another host
☆58Updated 4 years ago
Alternatives and similar repositories for etherpuppet:
Users that are interested in etherpuppet are comparing it to the libraries listed below
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 7 years ago
- ☆19Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆37Updated last year
- Wireshark Profiles for SS7, Diameter & GTP☆24Updated last month
- Network Tools☆32Updated last year
- THC "R U There" network discovery tool☆27Updated 4 years ago
- Easily Expandable Wireless Intrusion Detection System☆31Updated 4 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆42Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆94Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 5 years ago
- tshark + ELK analytics virtual machine☆67Updated last month
- SNIcat☆126Updated 3 years ago
- Some stuff about telecom security☆14Updated 9 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 4 years ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- Service Locator Protocol Research Tool☆9Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Exploit, Malware and Vulnerability Scoring Application☆11Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago