shramos / polymorphLinks
Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols
☆491Updated 9 months ago
Alternatives and similar repositories for polymorph
Users that are interested in polymorph are comparing it to the libraries listed below
Sorting:
- Decept Network Protocol Proxy☆281Updated 2 years ago
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- A command-line network packet crafting and injection utility☆525Updated 2 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆674Updated 2 years ago
- A full-fledged msfrpc library for Metasploit framework.☆302Updated 4 years ago
- Credentials catching honeypot☆384Updated last year
- mXtract - Memory Extractor & Analyzer☆592Updated 4 years ago
- Smart Install Exploitation Tool☆586Updated 3 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆655Updated last year
- Mallory - MiTM TCP and UDP Proxy☆322Updated 3 years ago
- Freedom Fighting Mode: open source hacking harness☆342Updated last year
- First IDE for Nmap Script (NSE) Development.☆359Updated 5 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆208Updated 7 years ago
- intercepting kali router☆446Updated 8 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Updated last year
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆505Updated 4 years ago
- network reconnaissance toolkit☆431Updated 6 years ago
- A framework for Backdoor development!☆437Updated 7 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- A Python Package for Data Exfiltration☆801Updated 4 months ago
- A low to medium interaction honeypot.☆473Updated last year
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆417Updated 3 years ago
- Exploits and Security Tools Framework 2.0.1☆307Updated 3 years ago
- just for fun ¯\_(ツ)_/¯☆272Updated 9 years ago
- The best way to scan for weak ssh passwords on your network☆617Updated last year
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Updated 6 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆360Updated 2 months ago
- The IKE Scanner☆399Updated last year
- ☆615Updated last year