singularity: A DNS rebinding attack framework
Singularity of Origin Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack server DNS name...
Singularity of Origin Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack server DNS name...
Sniffing & Spoofing / WebApp PenTest
by do son · Published December 28, 2019 · Last modified April 30, 2022
Black Widow black-widow is one of the most useful, powerful, and complete offensive penetration testing tools. It provides easy ways to execute many kinds of information gatherings and attacks. Fully...
Sniffle Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. It runs on Texas Instruments CC26x2 microcontrollers, including the low-cost CC26x2 Launchpad development board. The...
Crypto / Reverse Engineering / Sniffing & Spoofing / Social Engineering / Web Information Gathering / Web Vulnerability Analysis
by do son · Published August 20, 2019 · Last modified December 16, 2024
REBEL-FRAMEWORK Advanced and easy to use penetration testing framework Module├ ├ net/iface ➤ Interface info. ├ net/map ➤ Hosts live Scan in LAN. ├ net/scan ➤ Scan [Ports, OS, Etc]...
InveighZero InveighZero is a C# LLMNR/NBNS/mDNS/DNS spoofer and man-in-the-middle tool designed to assist penetration testers/red teamers that find themselves limited to a Windows system. This version shares many features with...
Defense / Forensics / Sniffing & Spoofing
by do son · Published July 25, 2019 · Last modified November 4, 2024
Wireshark Analyzer is a fantastic multi-platform open-source network protocol analyzer. It can be used to check the analysis of data from the network host to survive, but also look to...
D̳r̳M̳I̳T̳M̳ DrMITM is a program designed to globally log all traffic. H̳o̳w̳ i̳t̳ w̳o̳r̳k̳s̳ DrMITM sends a request to website and returns the IP of the website just in case...
Termshark A terminal user-interface for tshark, inspired by Wireshark. If you’re debugging on a remote machine with a large pcap and no desire to scp it back to your desktop,...
bettercap is a powerful, easily extensible, and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all...
Evil Limiter A tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access. evillimiter employs ARP spoofing and traffic shaping to throttle the bandwidth of hosts...
PRISM-AP PRISM-AP is an automated Wireless RogueAP MITM attack framework. FEATURES: Easy to setup and use and full automated Leverages MANA wifi attack to lure client connections Partial HSTS bypass...
What is StreamDump? StreamDump is used to cut traffic packets from a pcap format file or network interface by quaternions(src_ip,src_port,dst_ip,dst_port), each TCP stream is stored in a separate pcap file,...
ss7-fragz: Fragging SS7 for fun and profit SS7 is nowadays transported over SIGTRAN. The SIGTRAN stack relies on IP and SCTP. Above the adaptation layer – M2UA, M2PA, M3UA -, the...
MITMsmtp MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL/TLS encrypted connections. The idea is to catch sensitive...
Network PenTest / Sniffing & Spoofing
by do son · Published April 15, 2019 · Last modified October 25, 2022
Habu: Python Network Hacking Toolkit I’m developing Habu to teach (and learn) some concepts about Python and Network Hacking. These are basic functions that help with some tasks for Ethical...