shramos / polymorph
Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols
☆477Updated 3 months ago
Alternatives and similar repositories for polymorph
Users that are interested in polymorph are comparing it to the libraries listed below
Sorting:
- Smart Install Exploitation Tool☆580Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- mXtract - Memory Extractor & Analyzer☆591Updated 3 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆748Updated 6 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,421Updated 2 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- network reconnaissance toolkit☆421Updated 6 years ago
- Mallory - MiTM TCP and UDP Proxy☆317Updated 2 years ago
- A command-line network packet crafting and injection utility☆513Updated last year
- A Python Package for Data Exfiltration☆783Updated last year
- A tool to generate obfuscated one liners to aid in penetration testing☆178Updated 6 years ago
- Malicious HTTP traffic explorer☆715Updated 2 years ago
- First IDE for Nmap Script (NSE) Development.☆356Updated 4 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆522Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆669Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆207Updated 6 years ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- Tool to deploy a post-exploitation prompt at any time☆315Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆523Updated 8 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆547Updated 7 months ago
- Python telnet honeypot for catching botnet binaries☆305Updated last year
- Next Generation Firewall Audit and Bypass Tool☆264Updated 8 years ago
- A low to medium interaction honeypot.☆467Updated last year
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- Easy files and payloads delivery over DNS☆422Updated last year
- Credentials catching honeypot☆379Updated 11 months ago
- A framework for layer 2 attacks☆771Updated last year
- ☆605Updated 7 months ago