SSL/TLS layers for scapy the interactive packet manipulation tool
☆429Sep 21, 2021Updated 4 years ago
Alternatives and similar repositories for scapy-ssl_tls
Users that are interested in scapy-ssl_tls are comparing it to the libraries listed below
Sorting:
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- Support for HTTP in Scapy☆298Aug 14, 2019Updated 6 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Nov 25, 2021Updated 4 years ago
- SSL and TLS protocol test suite and fuzzer☆615Updated this week
- Scapy Penetration testing scripts☆21May 26, 2015Updated 10 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated 2 weeks ago
- A tool to fingerprint SSL/TLS servers☆264Nov 13, 2021Updated 4 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆193Oct 6, 2017Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82May 18, 2018Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- Scapy: the Python-based interactive packet manipulation program & library.☆12,082Updated this week
- Fake wireless Access Point (AP) implementation using Python and Scapy, intended for convenient testing of 802.11 protocols and implementa…☆248Aug 6, 2015Updated 10 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Post Exploitation Collection☆1,570May 1, 2020Updated 5 years ago
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Aug 11, 2021Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.☆451Dec 8, 2022Updated 3 years ago
- unix wildcard attacks☆137May 25, 2018Updated 7 years ago
- fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols☆1,143Jul 26, 2024Updated last year
- ☆48Jan 6, 2023Updated 3 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆183Jun 6, 2023Updated 2 years ago
- a grep -r for secrets☆179May 4, 2022Updated 3 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆873Aug 24, 2017Updated 8 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆345Aug 14, 2022Updated 3 years ago
- ☆86Feb 28, 2017Updated 9 years ago
- SSLStrip version to defeat HSTS☆324Sep 21, 2017Updated 8 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 2 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- TLS Redirection☆118Nov 21, 2017Updated 8 years ago