zlorb / scapyLinks
Scapy Install for Windows with Python 2.7
☆41Updated 7 years ago
Alternatives and similar repositories for scapy
Users that are interested in scapy are comparing it to the libraries listed below
Sorting:
- Scapy with dependencies for Python 2.7 on x86_64☆58Updated 11 years ago
- This project is part of improving Cuckoo Sandbox, for more information https://honeynet.org/gsoc/slot3 I will use Scapy to write protoco…☆107Updated 6 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 10 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 8 years ago
- ☆86Updated 2 years ago
- Some tools to monitor BillGates CnC servers☆136Updated 11 years ago
- EQGRP-Free-Files here.,☆46Updated 9 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 10 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Updated 8 years ago
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆91Updated 12 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Updated 9 years ago
- PowerShell module for the exploitation and testing☆16Updated 10 years ago
- The first open source vulnerability scanner for firmwares☆196Updated 9 years ago
- Some kernel exploit i wrote☆76Updated 11 years ago
- pam-backdoor allows you to login any account by your password if the box uses pam_unix or let me say /etc/passwd☆12Updated 12 years ago
- A Swiss Army Knife for Windows Exploit Development.☆40Updated 9 years ago
- ☆113Updated 8 years ago
- Fuzzbunch Python-Wine wrapper☆56Updated 8 years ago
- A malware/botnet analysis framework written in Ruby.☆195Updated 2 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153Updated 8 years ago
- ☆42Updated 3 years ago
- Published security vulnerabilities, research, and associated information.☆138Updated 6 years ago
- ☆91Updated 4 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 6 years ago
- ☆40Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 10 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 9 years ago
- ☆16Updated 10 years ago