shramos / polymorphLinks
Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols
☆494Updated 11 months ago
Alternatives and similar repositories for polymorph
Users that are interested in polymorph are comparing it to the libraries listed below
Sorting:
- A full-fledged msfrpc library for Metasploit framework.☆302Updated 4 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆403Updated last year
- Network reconnaissance and vulnerability assessment tools.☆400Updated 4 years ago
- Decept Network Protocol Proxy☆279Updated 3 years ago
- First IDE for Nmap Script (NSE) Development.☆359Updated 5 years ago
- A command-line network packet crafting and injection utility☆521Updated 2 years ago
- ☆612Updated last year
- A collection of various awesome lists for hackers, pentesters and security researchers☆329Updated 9 years ago
- Credentials catching honeypot☆387Updated last year
- mXtract - Memory Extractor & Analyzer☆591Updated 4 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆653Updated last year
- Freedom Fighting Mode: open source hacking harness☆344Updated last year
- Mallory - MiTM TCP and UDP Proxy☆321Updated 3 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆255Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 6 years ago
- A Python Package for Data Exfiltration☆805Updated 6 months ago
- network reconnaissance toolkit☆431Updated 7 years ago
- Tool to deploy a post-exploitation prompt at any time☆320Updated 4 years ago
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆419Updated 3 years ago
- A low to medium interaction honeypot.☆473Updated last year
- intercepting kali router☆443Updated 8 years ago
- Python framework for IT security tools☆268Updated 9 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Smart Install Exploitation Tool☆592Updated 4 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆209Updated 7 years ago
- Github for the scripts utilised during Penetration test☆236Updated 8 years ago
- Automated Linux evil maid attack☆434Updated 10 years ago
- kernel privilege escalation enumeration and exploitation framework☆700Updated 7 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆499Updated 2 years ago