Category: Sniffing

DHCPEthernetEttercapLibPCAPMacMan-in-the-MiddleMITMNEW TOOLSScanSniffingSSHSSLstrip

Ettercap – A Comprehensive Suite For Man In The Middle Attacks

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.ETTERCAP OFFERS THREE INTERFACES, TRADITIONAL COMMAND LINE, GUI AND NCURSES.Supported DistributionsThese distributions have been tested in both 32 and 64 bit flavors where possibleDebian/Ubuntu (Includes derivatives such as Kali, BackTrack, Mint, etc)FedoraGentooPentooMac OSX (Snow Leopard & Lion)FreeBSDOpenBSDNetBSDUnsupported DistributionsInstallation may work…

KillerBeeLibPCAPNEW TOOLSPacket CapturePacket InjectionPcapScapyScriptsSnifferSniffing

KillerBee – IEEE 802.15.4/ZigBee Security Research Toolkit

This is KillerBee - Framework and Tools for Attacking ZigBee and IEEE 802.15.4 networks.REQUIREMENTSKillerBee is developed and tested on Linux systems. OS X usage is possible but not supported.We have striven to use a minimum number of software dependencies, however, it is necessary to install the following Python modules before installation:serialusbcrypto (for some functions)pygtk (for use of tools that have GUIs)cairo (for use of tools that have GUIs)scapy (for some tools which utilize 802.15.4 Scapy extensions)On Ubuntu systems, you can install the needed dependencies…

MacNEW TOOLSSniffingTP-LINKTP-Link-defaults

TP-Link-defaults – Python Script For Trying Default Passwords For Some TP-Link Hotspots

Python script for trying default passwords for some TP-Link HotspotsInspired by Usageusage: [-h] [-p]Python script for trying default passwords for some TP-Link Hotspotsoptional arguments: -h, --help show this help message and exit -p, --print-all print all found ssid'sFOR EDUCATIONAL USE ONLYConfigtimeout stop sniffing after a given timeprint_all print all found ssid'sDownload TP-Link-defaults

CrawlingDiscoveryFile SharingFileshareMacNetwork AnalysisNEW TOOLSNmapNmap ScriptsScanSharesnifferSnifferSniffing

Sharesniffer – Network Share Sniffer And Auto-Mounter For Crawling Remote File Systems

sharesniffer is a network analysis tool for finding open and closed file shares on your local network. It includes auto-network discovery and auto-mounting of any open cifs and nfs shares.How to useExample to find all hosts in network and auto-mount at /mnt:python -l 4 --hosts -a -m /mntRequirementsPython 2.7 or 3.5Linux or macOSNmap in PATHNmap scripts (.nse) in PATH (on Linux/macOS they are usually in /usr/local/share/nmap/), if you don't have the ones required are also in the rootdir of sharesniffer.python-nmap…

AircrackAirodump-ngAirpydumpMacNEW TOOLSSniffing

Airpydump – Analyze Wireless Packets On The Fly. Currently Supporting Three Working Modes (Reader, Live, Stealth)

Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)Descriptionairpydump is a wireless packet analyzer, providing the interface most likely that of airodump-ng from aircrack suite. It currently provides three working modes which are Reader, Stealth and Live. Reader Mode is used to read a written captured file earlier either with airodump, wireshark or airpydump itself. Stealth mode is used when you are on a run and don't want to see the live traffic but just on the end of…

Information discoveryIntrusion DetectionIntrusion PreventionInvoke-ATTACKAPIMitreMitre Attack DBNEW TOOLSPowerShell ScriptPrivilege EscalationSniffingThreat Intelligence

Invoke-ATTACKAPI – A PowerShell Script To Interact With The MITRE ATT& CK Framework Via Its Own API

A PowerShell script to interact with the MITRE ATT&CK Framework via its own API in order to gather information about techniques, tactics, groups, software and references provided by the MITRE ATT&CK Team @MITREattack.GoalsProvide an easy way to interact with the MITRE ATT&CK Framework via its own API and PowerShell to the community.Expedite the acquisition of data from ATT&CK when preparing for a Hunting Campaign.Learn PowerShell Dynamic Parameters :)Getting StartedRequirementsPowerShell version 3+Installing /Importinggit clone Invoke-ATTACKAPIImport-Module .\Invoke-ATTACKAPI.ps1 /$$$$$$ /$$$$$$$$ /$$$$$$$$ /$$$ /$$$$$$ /$$ /$$ /$$$$$$…