Automate ARP poisoning, ssltrip, and ettercap.
☆48Jan 1, 2017Updated 9 years ago
Alternatives and similar repositories for snuff
Users that are interested in snuff are comparing it to the libraries listed below
Sorting:
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 6 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Oct 19, 2015Updated 10 years ago
- Database of websites for penetration testing☆180Jan 15, 2020Updated 6 years ago
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Reuploading the code she removed.☆14May 27, 2019Updated 6 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Apr 7, 2019Updated 6 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- ☆29Mar 15, 2017Updated 8 years ago
- [Moved] Adblock Fast for Android is an Android port of the Adblock Fast app.☆13Jun 1, 2016Updated 9 years ago
- ☆12Apr 14, 2017Updated 8 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- The place to talk about our infrastructure or everything related to the Ultimate Hosts Blacklist project.☆12Oct 2, 2024Updated last year
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- Metasploit Framework☆11Sep 5, 2017Updated 8 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- Free sampling of files from the purported Equation Group hack.☆11Apr 10, 2017Updated 8 years ago
- ☆13Sep 12, 2022Updated 3 years ago
- ☆12Apr 17, 2017Updated 8 years ago