secdev / scapytain
Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.
☆19Updated 6 years ago
Alternatives and similar repositories for scapytain:
Users that are interested in scapytain are comparing it to the libraries listed below
- Test Suite for John the Ripper☆24Updated 3 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 9 months ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- ☆13Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆40Updated 4 years ago
- ☆28Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Viproxy (Interactive TCP/TLS proxy forked from em-proxy)☆11Updated 10 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Yara syntax highlighting☆25Updated 3 years ago
- Maltego integration of https://abusix.com☆17Updated 6 years ago
- Binary reversing tool to find all possible code paths between two functions.☆27Updated 7 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago