tecknicaltom / dsniff
dsniff is a collection of tools for network auditing and penetration testing.
☆206Updated 14 years ago
Alternatives and similar repositories for dsniff:
Users that are interested in dsniff are comparing it to the libraries listed below
- archive of code from http://www.unicornscan.org/☆71Updated 12 years ago
- DMitry (Deepmagic Information Gathering Tool)☆215Updated 9 months ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- A command-line network packet crafting and injection utility☆511Updated last year
- SensePost's modified hostapd for wifi attacks.☆566Updated 8 months ago
- Tool to identify routers on the local LAN and paths to the Internet☆204Updated last year
- Maltego Penetration Testing Transforms☆367Updated 5 years ago
- Open Source Network Forensic Analysis Tool (NFAT)☆189Updated 4 years ago
- fork of http://code.google.com/p/dnsmap/source/checkout☆116Updated 7 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆381Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 6 months ago
- Plugins for Metasploit Framework☆449Updated 6 years ago
- SpiderLabs shared Nmap Tools☆229Updated 4 years ago
- SSLStrip version to defeat HSTS☆69Updated 2 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆290Updated 5 months ago
- Does some google dorks against a domain☆166Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 8 years ago
- Automatically exported from code.google.com/p/creddump☆249Updated 5 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆441Updated this week
- A framework for layer 2 attacks☆767Updated last year
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆109Updated 2 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Updated 3 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆163Updated 7 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆283Updated 8 years ago
- NTP Main-in-the-Middle tool☆244Updated 3 years ago
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆411Updated 3 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆265Updated 11 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- ☆118Updated 2 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago