stamparm / pcapy-ngLinks
Pcapy-NG is a Python extension module that interfaces with the libpcap packet capture library.
☆25Updated 2 years ago
Alternatives and similar repositories for pcapy-ng
Users that are interested in pcapy-ng are comparing it to the libraries listed below
Sorting:
- Cross platform system wide proxy server & TLS Interception library for Python☆23Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- The largest collection of wordlists in yaml for bug bounty tools☆37Updated last year
- CLI tool to analyze APKs☆42Updated last year
- ☆13Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Updated 2 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 3 years ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆33Updated last year
- The WASM Based Security Toolkit for the Web First Paradigm☆36Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- ☆33Updated 11 months ago
- My malware analysis code snippets☆28Updated 2 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- ☆15Updated 6 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- PAM Backdoor☆33Updated 2 years ago
- Norimaci is a simple and lightweight malware analysis sandbox for macOS☆70Updated 5 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Updated 7 years ago
- ☆10Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated 3 weeks ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- The application is a PoC that helps in identifying modern bankers, potentially malicious and remote controlling applications abusing Andr…☆43Updated 11 months ago
- Build wordlists from the common-crawl index☆12Updated 3 years ago