tomac / yersiniaLinks
A framework for layer 2 attacks
☆796Updated 2 years ago
Alternatives and similar repositories for yersinia
Users that are interested in yersinia are comparing it to the libraries listed below
Sorting:
- DNSChef - DNS proxy for Penetration Testers and Malware Analysts☆995Updated last year
- IPv6 attack toolkit☆1,123Updated last week
- Ncrack network authentication tool☆1,156Updated last year
- SensePost's modified hostapd for wifi attacks.☆581Updated last year
- Fetch, install and search wordlist archives from websites and torrent peers.☆518Updated last year
- dnsenum is a perl script that enumerates DNS information☆656Updated 5 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆645Updated 4 years ago
- A command-line network packet crafting and injection utility☆520Updated last year
- netdiscover☆402Updated 2 years ago
- The IKE Scanner☆385Updated last year
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,460Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,318Updated 4 years ago
- Fast SNMP Scanner☆641Updated 3 weeks ago
- pwning IPv4 via IPv6☆1,836Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,229Updated 3 weeks ago
- Data exfiltration over DNS request covert channel☆871Updated last year
- SMBMap is a handy SMB enumeration tool☆1,948Updated 6 months ago
- PACK (Password Analysis and Cracking Kit)☆854Updated 5 years ago
- A default credential scanner.☆1,497Updated 2 months ago
- Pipal, THE password analyser☆649Updated 2 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,368Updated 11 months ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,433Updated 2 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,296Updated 3 years ago
- A Python Package for Data Exfiltration☆793Updated 2 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,755Updated 7 months ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,071Updated 4 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆846Updated 7 months ago
- MSFvenom Payload Creator (MSFPC)☆1,282Updated 4 years ago
- Automatically exported from code.google.com/p/armitage☆555Updated 3 years ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆797Updated 4 months ago