shramos / polymorphLinks
Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols
☆486Updated 8 months ago
Alternatives and similar repositories for polymorph
Users that are interested in polymorph are comparing it to the libraries listed below
Sorting:
- A full-fledged msfrpc library for Metasploit framework.☆301Updated 4 years ago
- First IDE for Nmap Script (NSE) Development.☆359Updated 5 years ago
- mXtract - Memory Extractor & Analyzer☆592Updated 3 years ago
- A command-line network packet crafting and injection utility☆518Updated 2 years ago
- SSLStrip version to defeat HSTS☆321Updated 8 years ago
- Smart Install Exploitation Tool☆586Updated 3 years ago
- Mallory - MiTM TCP and UDP Proxy☆322Updated 3 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆655Updated last year
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆208Updated 6 years ago
- intercepting kali router☆443Updated 8 years ago
- Network reconnaissance and vulnerability assessment tools.☆402Updated 3 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆507Updated 4 years ago
- ☆615Updated last year
- kernel privilege escalation enumeration and exploitation framework☆698Updated 7 years ago
- DHCP exhaustion script written in python using scapy network library☆352Updated 4 months ago
- SSL/TLS layers for scapy the interactive packet manipulation tool☆426Updated 4 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- Tool to deploy a post-exploitation prompt at any time☆317Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated last month
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆415Updated 3 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 4 years ago
- Modern tactical exploitation toolkit.☆852Updated 2 weeks ago
- A low to medium interaction honeypot.☆470Updated last year
- just for fun ¯\_(ツ)_/¯☆272Updated 9 years ago
- A Python Package for Data Exfiltration☆796Updated 3 months ago
- Automated Linux evil maid attack☆431Updated 9 years ago
- Bash post exploitation toolkit☆742Updated 2 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Updated 5 years ago
- Freedom Fighting Mode: open source hacking harness☆340Updated last year