Wednesday, November 14, 2018

Sniffing/Spoofing

Sniffing Main menu

Sniffing/Spoofing

Home Sniffing/Spoofing
Sniffing Main menu
tcpflow

Tcpflow – To Monitor, Capture & Dump Packets

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used...
thc logo

parasite6

Redirect all IPv6 traffic through your attacker machine with parasite6 Parasite6 is the arpspoof in IPv6 networks and also a part...

fake_router6

Create a rouge ipv6 router in one simple step with fake_router6 fake_router6 is a tool inside THC-IPv6 tools bundled inside Kali...

Must Need

CyberChef

CyberChef – A web App For Encryption, Encoding, Compression & Data...

CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include simple encoding...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
Hack Windows Installer

Hack Windows Installer For The Hack Typeface

Hack Windows Installer A Hack Windows installer for the Hack typeface. While it may appear like pointless excess to utilize a hack windows installer for fonts,...
WebvulScan

WebvulScan – Web Application Vulnerability Scanner

WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or...
GhostTunnel

GhostTunnel – Backdoor Transmission Method That Can Be Used In An...

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...
Vulners-Scanner

Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API

Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities in it. It currently...
Metadata-Attacker

Metadata-Attacker : A Tool To Generate Media Files With Malicious Metadata

Metadata-Attacker is a open source pentesting tools you're able to create an image (.jpg), audio (.mp3) or video (.mp4) file containing your custom metadata...