shramos / polymorphLinks
Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols
☆493Updated 10 months ago
Alternatives and similar repositories for polymorph
Users that are interested in polymorph are comparing it to the libraries listed below
Sorting:
- Easy-to-use live forensics toolbox for Linux endpoints☆404Updated last year
- Decept Network Protocol Proxy☆281Updated 2 years ago
- Credentials catching honeypot☆384Updated last year
- First IDE for Nmap Script (NSE) Development.☆359Updated 5 years ago
- A full-fledged msfrpc library for Metasploit framework.☆302Updated 4 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆330Updated 9 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 4 years ago
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆413Updated 5 years ago
- just for fun ¯\_(ツ)_/¯☆273Updated 9 years ago
- Mallory - MiTM TCP and UDP Proxy☆322Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆676Updated 2 years ago
- ☆615Updated last year
- Automated Linux evil maid attack☆433Updated 9 years ago
- intercepting kali router☆442Updated 8 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆654Updated last year
- Car Backdoor Maker☆220Updated 7 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- Exploits and Security Tools Framework 2.0.1☆307Updated 3 years ago
- A framework for Backdoor development!☆434Updated 7 years ago
- mXtract - Memory Extractor & Analyzer☆591Updated 4 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- Freedom Fighting Mode: open source hacking harness☆343Updated last year
- A low to medium interaction honeypot.☆474Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 6 years ago
- Next Generation Firewall Audit and Bypass Tool☆265Updated 8 years ago
- A command-line network packet crafting and injection utility☆524Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆360Updated 3 months ago