Wednesday, March 20, 2019

Sniffing/Spoofing

Sniffing Main menu

Sniffing/Spoofing

Home Sniffing/Spoofing
Sniffing Main menu
tcpflow

Tcpflow – To Monitor, Capture & Dump Packets

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used...
thc logo

parasite6

Redirect all IPv6 traffic through your attacker machine with parasite6 Parasite6 is the arpspoof in IPv6 networks and also a part...

fake_router6

Create a rouge ipv6 router in one simple step with fake_router6 fake_router6 is a tool inside THC-IPv6 tools bundled inside Kali...

Must Need

Darling

Darling – Darwin/Mac OS Emulation Layer For Linux

Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download Darling Darling uses many Git...
Munin

Munin – Online Hash Checker For Virustotal & Other Services

Munin is a online hash checker utility that retrieves valuable information from various online sources The current version of Munin queries the following services: Virustotal ...
SIPI

SIPI – Simple IP Information Tools for Reputation Data Analysis

SIPI tool is aimed for Incident Response Team and anyone what's want to know the behaviour of the "suspicious" IP Address. The tools do...
XAttacker

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find vulnerability in your website...
Cangibrina

Cangibrina Tool To Obtain Dashboard Of Sites Using Brute-Force

Cangibrina is a multi platform apparatus which means to acquire the Dashboard of sites utilizing brute-force over wordlist, google, nmap, and robots.txt. A quick...

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python...
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...