ymirsky / Vesper
A man in the middle detection tool for LANs
☆26Updated last year
Alternatives and similar repositories for Vesper
Users that are interested in Vesper are comparing it to the libraries listed below
Sorting:
- ☆15Updated 8 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23Updated 9 years ago
- Apache use after free bug infos / ASAN stack traces☆66Updated 6 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆39Updated 4 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 3 years ago
- Script for pcap modification, reconstruction and anonymization☆19Updated 5 months ago
- ☆36Updated 12 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- eSentire additions to the nmap network scanner☆13Updated 9 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Antivirus for Linux operating system☆9Updated 8 years ago
- Passive DHCP fingerprinting implementation☆51Updated 8 years ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated 9 months ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆34Updated 3 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- USB Attack Development Platform☆31Updated 6 years ago
- ☆18Updated 12 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- Network aware keylogger: broadcasting on your local area network.☆20Updated 11 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Phishing Toolkit☆20Updated 7 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Network Tools☆32Updated last year