zlorb / scapyLinks
Scapy Install for Windows with Python 2.7
☆41Updated 7 years ago
Alternatives and similar repositories for scapy
Users that are interested in scapy are comparing it to the libraries listed below
Sorting:
- Scapy with dependencies for Python 2.7 on x86_64☆58Updated 10 years ago
- This project is part of improving Cuckoo Sandbox, for more information https://honeynet.org/gsoc/slot3 I will use Scapy to write protoco…☆106Updated 6 years ago
- EQGRP-Free-Files here.,☆45Updated 9 years ago
- ☆113Updated 8 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 8 years ago
- pam-backdoor allows you to login any account by your password if the box uses pam_unix or let me say /etc/passwd☆12Updated 12 years ago
- Raw Packet Injection tool☆238Updated 4 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 11 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆180Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆68Updated 9 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Updated 9 years ago
- ☆40Updated 9 years ago
- ☆86Updated 2 years ago
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆91Updated 12 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 9 years ago
- ☆42Updated 3 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 5 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- A simple way for detection the remote user's antivirus☆84Updated 8 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Updated 16 years ago
- ☆76Updated 6 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆207Updated 8 years ago
- Some kernel exploit i wrote☆76Updated 10 years ago
- MS17-010 Research☆96Updated 8 years ago
- PowerShell module for the exploitation and testing☆16Updated 10 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆98Updated 11 years ago
- ☆90Updated 4 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Updated 7 years ago
- using python to hack☆31Updated 9 years ago
- A Swiss Army Knife for Windows Exploit Development.☆40Updated 9 years ago