tomac / yersinia
A framework for layer 2 attacks
☆747Updated last year
Alternatives and similar repositories for yersinia:
Users that are interested in yersinia are comparing it to the libraries listed below
- Ncrack network authentication tool☆1,103Updated 10 months ago
- A command-line network packet crafting and injection utility☆505Updated last year
- Network Infrastructure Penetration Testing Tool☆1,631Updated 3 years ago
- Smart Install Exploitation Tool☆575Updated 3 years ago
- dnsenum is a perl script that enumerates DNS information☆628Updated 5 years ago
- SMBMap is a handy SMB enumeration tool☆1,844Updated last month
- pwning IPv4 via IPv6☆1,758Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,303Updated 3 years ago
- SensePost's modified hostapd for wifi attacks.☆560Updated 6 months ago
- IPv6 attack toolkit☆1,059Updated last week
- MSFvenom Payload Creator (MSFPC)☆1,242Updated 3 years ago
- DNSChef - DNS proxy for Penetration Testers and Malware Analysts☆934Updated 6 months ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,256Updated 3 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,417Updated last year
- DNS Enumeration Script☆2,710Updated last week
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,650Updated 5 months ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,416Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆503Updated 10 months ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,016Updated 2 years ago
- The IKE Scanner☆369Updated 5 months ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆1,036Updated 3 months ago
- Fast SNMP Scanner☆571Updated last year
- Modified hostapd to facilitate AP impersonation attacks☆502Updated 6 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆837Updated last week
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,690Updated 4 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,064Updated 3 weeks ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,082Updated this week
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆969Updated 7 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,092Updated 4 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,259Updated 4 months ago