secdev / etherpuppetLinks
Clone network interface from one host as a tap interface on another host
☆60Updated 4 years ago
Alternatives and similar repositories for etherpuppet
Users that are interested in etherpuppet are comparing it to the libraries listed below
Sorting:
- ☆20Updated last year
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆74Updated last year
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- A Passive SSH back-end and scanner.☆103Updated 2 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- tshark + ELK analytics virtual machine☆69Updated 6 months ago
- Network Tools☆34Updated last year
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Complete SMS packet manipulation☆114Updated 3 years ago
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆37Updated last year
- 5 cves of ntp 4.2.8p15 founded by me.☆12Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- ☆49Updated 3 weeks ago
- Easily Expandable Wireless Intrusion Detection System☆31Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆71Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated 2 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- some config files☆12Updated this week