ExchangeRelayX: An NTLM relay tool to the EWS endpoint
ExchangeRelayX An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers. Version 1.0.0. This tool is a PoC to demonstrate the ability of...
ExchangeRelayX An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers. Version 1.0.0. This tool is a PoC to demonstrate the ability of...
SMBetray SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over the wire in cleartext. Version 1.0.0....
DNS Rebind Toolkit DISCLAIMER: This software is for educational purposes only. This software should not be used for illegal activity. The author is not responsible for its use. Don’t be...
Sniffing & Spoofing / Wireless
by do son · Published August 20, 2018 · Last modified November 4, 2024
zizzania sniffs wireless traffic listening for WPA handshakes and dumping only those frames suitable to be decrypted (one beacon + EAPOL frames + data). In order to speed up the...
CERT Tapioca is a utility for testing mobile or any other application using MITM techniques. CERT Tapioca development was sponsored by the United States Army Armament Research, Development, and Engineering...
DHCPwn is a tool used for testing DHCP IP exhaustion attacks. It can also be used to sniff local DHCP traffic. Useful links: DHCP RFC1531 (obsolete) RFC1541 (obsolete) RFC2131 Bootstrap Protocol RFC951 Overview The DHCP protocol is connectionless and...
passivedns A tool to collect DNS records passively to aid Incident handling, Network Security Monitoring (NSM) and general digital forensics. PassiveDNS sniffs traffic from an interface or reads a pcap-file...
Whonow DNS Server A malicious DNS server for executing DNS Rebinding attacks on the fly. whonow lets you specify DNS responses and rebind rules dynamically using domain requests themselves. What’s great about dynamic DNS Rebinding...
Forensics / Network PenTest / Password Attacks / Reverse Engineering / Sniffing & Spoofing
by do son · Published July 2, 2018 · Last modified November 4, 2024
pythem – Penetration Testing Framework pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and security professionals. Usage Examples ARP...
Forensics / Networking / Sniffing & Spoofing
by do son · Published June 8, 2018 · Last modified October 10, 2021
POLYMORPH Polymorph is a framework written in the Python3 programming language that allows the modification of network packets in real-time, providing maximum control to the user over the contents of...
Network PenTest / Sniffing & Spoofing / Social Engineering
by do son · Published May 25, 2018 · Last modified December 16, 2024
SimpleEmailSpoofer A few Python programs designed to help penetration testers with email spoofing. Email Spoofing 101 Basic Principles Email spoofing has been an issue since the earliest days of the...
Networking / Sniffing & Spoofing
by do son · Published May 11, 2018 · Last modified October 10, 2021
EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with...
Exploitation / Forensics / Information Gathering / Network PenTest / Reverse Engineering / Sniffing & Spoofing / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis / WebApp PenTest / Wireless
by do son · Published April 25, 2018
PloitKit is a Python-based GUI tool designed as one-stop for all other software. I was facing these kinds of problem when I need to switch to the different system, or...
Winregmitm is a tool that performs filtering, processing, and forwarding of packets from the Windows Remote Registry protocol. To perform these actions, the tool must be placed in the middle...
Information Gathering / Network PenTest / Sniffing & Spoofing / Wireless
by do son · Published April 1, 2018 · Last modified May 1, 2024
pentmenu A bash script inspired by pentbox. Designed to be a simple way to implement various network pentesting functions, including network attacks, using wherever possible readily available software commonly installed...