shramos / polymorph
Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols
☆474Updated last month
Alternatives and similar repositories for polymorph:
Users that are interested in polymorph are comparing it to the libraries listed below
- Tool to deploy a post-exploitation prompt at any time☆311Updated 3 years ago
- A Python Package for Data Exfiltration☆776Updated 10 months ago
- Credentials catching honeypot☆377Updated 10 months ago
- A network packet forensics tool for SSH☆252Updated 4 years ago
- Modern tactical exploitation toolkit.☆842Updated 8 months ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆825Updated 7 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆898Updated 2 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- First IDE for Nmap Script (NSE) Development.☆356Updated 4 years ago
- Next Generation Firewall Audit and Bypass Tool☆264Updated 7 years ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,209Updated 4 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 5 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- A command-line network packet crafting and injection utility☆510Updated last year
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆746Updated 6 years ago
- virtual honeypots☆368Updated last year
- Reverse Shell Cheat Sheet TooL☆293Updated 4 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆178Updated 6 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆408Updated 5 years ago
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Updated 6 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆501Updated 7 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆207Updated 6 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆370Updated last year
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆327Updated 6 years ago