tomac / yersiniaLinks
A framework for layer 2 attacks
☆775Updated last year
Alternatives and similar repositories for yersinia
Users that are interested in yersinia are comparing it to the libraries listed below
Sorting:
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,310Updated 3 years ago
- Ncrack network authentication tool☆1,138Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,264Updated 4 years ago
- SMBMap is a handy SMB enumeration tool☆1,909Updated 3 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,739Updated 4 months ago
- Undetectable Windows Payload Generation☆1,599Updated 2 years ago
- dnsenum is a perl script that enumerates DNS information☆639Updated 5 years ago
- A command-line network packet crafting and injection utility☆514Updated last year
- Automatically exported from code.google.com/p/unix-privesc-check☆1,064Updated 4 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆511Updated last year
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,281Updated 3 years ago
- pwning IPv4 via IPv6☆1,793Updated last year
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 7 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,317Updated 8 months ago
- Modified hostapd to facilitate AP impersonation attacks☆509Updated 7 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,444Updated last year
- Find exploits in local and online databases instantly☆1,738Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 4 years ago
- The IKE Scanner☆380Updated 8 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,834Updated last year
- Fast SNMP Scanner☆604Updated 2 years ago
- A default credential scanner.☆1,482Updated 3 years ago
- Unified repository for different Metasploit Framework payloads☆1,843Updated this week
- DNS Enumeration Script☆2,780Updated this week
- Software to identify the different types of hashes -☆1,378Updated 2 years ago
- Sniffs sensitive data from interface or pcap☆1,754Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,423Updated 2 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,604Updated 4 years ago
- IPv6 attack toolkit☆1,085Updated 3 months ago
- SensePost's modified hostapd for wifi attacks.☆570Updated 9 months ago