shramos / polymorph
Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols
☆468Updated last year
Alternatives and similar repositories for polymorph:
Users that are interested in polymorph are comparing it to the libraries listed below
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,416Updated last year
- Decept Network Protocol Proxy☆274Updated 2 years ago
- Smart Install Exploitation Tool☆575Updated 3 years ago
- kernel privilege escalation enumeration and exploitation framework☆689Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆159Updated 5 years ago
- A Python Package for Data Exfiltration☆773Updated 8 months ago
- Tool to deploy a post-exploitation prompt at any time☆309Updated 3 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆248Updated 5 years ago
- A fully functional DanderSpritz lab in 2 commands☆423Updated 5 years ago
- First IDE for Nmap Script (NSE) Development.☆356Updated 4 years ago
- Mallory - MiTM TCP and UDP Proxy☆314Updated 2 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆651Updated 10 months ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆180Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- ☆511Updated last year
- AI-based, context-driven network device ranking☆294Updated last year
- network reconnaissance toolkit☆420Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆371Updated last year
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆327Updated 5 years ago
- Network reconnaissance and vulnerability assessment tools.☆397Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 3 years ago
- fireELF - Fileless Linux Malware Framework☆660Updated 5 years ago
- Easy files and payloads delivery over DNS☆420Updated 9 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,206Updated 4 years ago
- Reverse Shell Cheat Sheet TooL☆292Updated 4 years ago
- ☆602Updated 4 months ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆488Updated 3 years ago
- Next Generation Firewall Audit and Bypass Tool☆263Updated 7 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆727Updated 7 years ago