tomac / yersiniaLinks
A framework for layer 2 attacks
☆793Updated last year
Alternatives and similar repositories for yersinia
Users that are interested in yersinia are comparing it to the libraries listed below
Sorting:
- dnsenum is a perl script that enumerates DNS information☆653Updated 5 years ago
- DNSChef - DNS proxy for Penetration Testers and Malware Analysts☆987Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆644Updated 4 years ago
- IPv6 attack toolkit☆1,113Updated 6 months ago
- Ncrack network authentication tool☆1,151Updated last year
- Fetch, install and search wordlist archives from websites and torrent peers.☆517Updated last year
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,454Updated last year
- A command-line network packet crafting and injection utility☆520Updated last year
- SensePost's modified hostapd for wifi attacks.☆578Updated last year
- Automatically exported from code.google.com/p/unix-privesc-check☆1,068Updated 4 years ago
- netdiscover☆398Updated 2 years ago
- The IKE Scanner☆384Updated 11 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,318Updated 3 years ago
- Fast SNMP Scanner☆633Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,753Updated 7 months ago
- pwning IPv4 via IPv6☆1,829Updated last year
- Smart Install Exploitation Tool☆582Updated 3 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,292Updated 3 years ago
- Network Infrastructure Penetration Testing Tool☆1,657Updated 4 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,433Updated 2 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆844Updated 6 months ago
- caplets and proxy modules.☆506Updated 4 months ago
- SMBMap is a handy SMB enumeration tool☆1,943Updated 6 months ago
- Steganography brute-force utility to uncover hidden data inside files☆577Updated 4 years ago
- MSFvenom Payload Creator (MSFPC)☆1,281Updated 4 years ago
- Various webshells. We accept pull requests for additions to this collection.☆972Updated last year
- A Python Package for Data Exfiltration☆794Updated last month
- Data exfiltration over DNS request covert channel☆871Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,355Updated 11 months ago
- Pop shells like a master.☆1,472Updated 6 years ago