shramos / polymorphLinks
Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols
☆480Updated 6 months ago
Alternatives and similar repositories for polymorph
Users that are interested in polymorph are comparing it to the libraries listed below
Sorting:
- Mallory - MiTM TCP and UDP Proxy☆319Updated 3 years ago
- mXtract - Memory Extractor & Analyzer☆594Updated 3 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆656Updated last year
- A full-fledged msfrpc library for Metasploit framework.☆303Updated 3 years ago
- Decept Network Protocol Proxy☆277Updated 2 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆407Updated last year
- Smart Install Exploitation Tool☆583Updated 3 years ago
- Credentials catching honeypot☆381Updated last year
- A Python Package for Data Exfiltration☆792Updated last month
- XFLTReaT tunnelling framework☆329Updated 5 years ago
- A command-line network packet crafting and injection utility☆518Updated last year
- intercepting kali router☆439Updated 7 years ago
- First IDE for Nmap Script (NSE) Development.☆357Updated 5 years ago
- Freedom Fighting Mode: open source hacking harness☆339Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆829Updated 7 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆673Updated last year
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆208Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,216Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆503Updated 5 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 5 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,434Updated 2 years ago
- SSLStrip version to defeat HSTS☆319Updated 7 years ago
- A low to medium interaction honeypot.☆469Updated last year
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 6 years ago
- just for fun ¯\_(ツ)_/¯☆272Updated 8 years ago
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆415Updated 3 years ago
- Windows passwords decryption from dump files☆501Updated 2 years ago