ymirsky / VesperLinks
A man in the middle detection tool for LANs
☆26Updated last year
Alternatives and similar repositories for Vesper
Users that are interested in Vesper are comparing it to the libraries listed below
Sorting:
- ☆15Updated 8 years ago
- ☆36Updated 12 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 12 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆40Updated 4 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23Updated 9 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Script for pcap modification, reconstruction and anonymization☆19Updated 7 months ago
- Linux Runtime Process Injection Tool☆61Updated 12 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 8 months ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 3 years ago
- A collection of shellcodes☆69Updated 13 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆22Updated 7 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76Updated last year
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- ☆24Updated 9 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- ☆13Updated 11 years ago