stamparm / tsusenLinks
Network traffic sensor
☆112Updated 3 years ago
Alternatives and similar repositories for tsusen
Users that are interested in tsusen are comparing it to the libraries listed below
Sorting:
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆189Updated 6 years ago
- A tool to generate graph and other output from NMAP XML files☆117Updated 6 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- ☆48Updated 9 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆107Updated 8 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- Repo for autosnort scripts.☆158Updated 4 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Honeypot deployment made easy☆237Updated 6 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Telnet Honeypot☆162Updated 6 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- Rogue AP killer☆90Updated 7 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago