singularity: A DNS rebinding attack framework
Singularity of Origin Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack server DNS name...
Singularity of Origin Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack server DNS name...
Sniffing & Spoofing / WebApp PenTest
by do son · Published December 28, 2019 · Last modified April 30, 2022
Black Widow black-widow is one of the most useful, powerful, and complete offensive penetration testing tools. It provides easy ways to execute many kinds of information gatherings and attacks. Fully...
Sniffle Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. It runs on Texas Instruments CC26x2 microcontrollers, including the low-cost CC26x2 Launchpad development board. The...
Crypto / Reverse Engineering / Sniffing & Spoofing / Social Engineering / Web Information Gathering / Web Vulnerability Analysis
by do son · Published August 20, 2019 · Last modified October 10, 2021
REBEL-FRAMEWORK Advanced and easy to use penetration testing framework Module├ ├ net/iface ➤ Interface info. ├ net/map ➤ Hosts live Scan in LAN. ├ net/scan ➤ Scan [Ports, OS, Etc]...
Responder an LLMNR, NBT-NS, and MDNS poisoner. It will answer to specific NBT-NS (NetBIOS Name Service) queries based on their name suffix (see: http://support.microsoft.com/kb/163409). By default, the tool will only answer to File...
InveighZero InveighZero is a C# LLMNR/NBNS/mDNS/DNS spoofer and man-in-the-middle tool designed to assist penetration testers/red teamers that find themselves limited to a Windows system. This version shares many features with...
Post Exploitation / Sniffing & Spoofing
by do son · Published July 31, 2019 · Last modified June 13, 2023
Inveigh Inveigh is a cross-platform .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers. This repo contains the primary C# version as well as the legacy PowerShell version. Overview Inveigh conducts spoofing...
Defense / Forensics / Sniffing & Spoofing
by do son · Published July 25, 2019 · Last modified November 4, 2024
Wireshark Analyzer is a fantastic multi-platform open-source network protocol analyzer. It can be used to check the analysis of data from the network host to survive, but also look to...
D̳r̳M̳I̳T̳M̳ DrMITM is a program designed to globally log all traffic. H̳o̳w̳ i̳t̳ w̳o̳r̳k̳s̳ DrMITM sends a request to website and returns the IP of the website just in case...
Termshark A terminal user-interface for tshark, inspired by Wireshark. If you’re debugging on a remote machine with a large pcap and no desire to scp it back to your desktop,...
bettercap is a powerful, easily extensible, and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all...
sniffglue sniffglue is a network sniffer written in rust. Network packets are parsed concurrently using a thread pool to utilize all cpu cores. Project goals are that you can run...
Evil Limiter A tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access. evillimiter employs ARP spoofing and traffic shaping to throttle the bandwidth of hosts...
PRISM-AP PRISM-AP is an automated Wireless RogueAP MITM attack framework. FEATURES: Easy to setup and use and full automated Leverages MANA wifi attack to lure client connections Partial HSTS bypass...
What is StreamDump? StreamDump is used to cut traffic packets from a pcap format file or network interface by quaternions(src_ip,src_port,dst_ip,dst_port), each TCP stream is stored in a separate pcap file,...