Update render script and Makefile
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Scapy [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Scapy [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
|
||||
[38;5;12m [39m
|
||||
|
||||
@@ -33,21 +33,21 @@
|
||||
|
||||
[38;5;12mMeasurements[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mmtraceroute[0m[38;5;12m (https://github.com/rwhalb/mtraceroute) - Create cool graphs over multiple traceroute analysis.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mNetwork[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mToolkit[0m[38;5;14m[1m [0m[38;5;14m[1m(NST)[0m[38;5;12m [39m[38;5;12m(https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Use_The_Scapy:_Multi-Traceroute_-_MTR)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIncludes[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12menhanced[39m[38;5;12m [39m[38;5;12mversion[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[48;5;235m[38;5;249mmtraceroute[49m[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mIP[39m[38;5;12m [39m[38;5;12mGeolocation[39m[38;5;12m [39m
|
||||
[38;5;12mand[39m[38;5;12m [39m[38;5;12mGUI[39m[38;5;12m [39m[38;5;12mmanagement.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mNetwork[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mToolkit[0m[38;5;14m[1m [0m[38;5;14m[1m(NST)[0m[38;5;12m [39m[38;5;12m(https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Use_The_Scapy:_Multi-Traceroute_-_MTR)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIncludes[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12menhanced[39m[38;5;12m [39m[38;5;12mversion[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[48;5;235m[38;5;249mmtraceroute[49m[39m[38;5;12m [39m
|
||||
[38;5;12mwith[39m[38;5;12m [39m[38;5;12mIP[39m[38;5;12m [39m[38;5;12mGeolocation[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mGUI[39m[38;5;12m [39m[38;5;12mmanagement.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mnetprobify[0m[38;5;12m (https://github.com/criteo/netprobify) - Network probing tool crafted for datacenters (but not only). Probing using: TCP, UDP or ICMP.[39m
|
||||
|
||||
[38;5;12mProtocols[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCotopaxi[0m[38;5;12m [39m[38;5;12m(https://github.com/Samsung/cotopaxi)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSet[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mInternet[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mThings[39m[38;5;12m [39m[38;5;12mdevices[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mIoT[39m[38;5;12m [39m[38;5;12mprotocols[39m[38;5;12m [39m[38;5;12m(AMQP,[39m[38;5;12m [39m[38;5;12mCoAP,[39m[38;5;12m [39m[38;5;12mDTLS,[39m[38;5;12m [39m[38;5;12mHTCPCP,[39m[38;5;12m [39m[38;5;12mKNX,[39m[38;5;12m [39m[38;5;12mmDNS,[39m[38;5;12m [39m[38;5;12mMQTT,[39m[38;5;12m [39m[38;5;12mMQTT-SN,[39m[38;5;12m [39m[38;5;12mQUIC,[39m[38;5;12m [39m
|
||||
[38;5;12mRTSP,[39m[38;5;12m [39m[38;5;12mSSDP)[39m[38;5;12m [39m[38;5;12m.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCotopaxi[0m[38;5;12m [39m[38;5;12m(https://github.com/Samsung/cotopaxi)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSet[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mInternet[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mThings[39m[38;5;12m [39m[38;5;12mdevices[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mIoT[39m[38;5;12m [39m[38;5;12mprotocols[39m[38;5;12m [39m[38;5;12m(AMQP,[39m[38;5;12m [39m[38;5;12mCoAP,[39m[38;5;12m [39m[38;5;12mDTLS,[39m[38;5;12m [39m[38;5;12mHTCPCP,[39m[38;5;12m [39m[38;5;12mKNX,[39m[38;5;12m [39m[38;5;12mmDNS,[39m[38;5;12m [39m
|
||||
[38;5;12mMQTT,[39m[38;5;12m [39m[38;5;12mMQTT-SN,[39m[38;5;12m [39m[38;5;12mQUIC,[39m[38;5;12m [39m[38;5;12mRTSP,[39m[38;5;12m [39m[38;5;12mSSDP)[39m[38;5;12m [39m[38;5;12m.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mproject-memoria-detector[0m[38;5;12m (https://github.com/Forescout/project-memoria-detector) - Determine whether a network device runs a specific embedded TCP/IP stack.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mroutopsy[0m[38;5;12m (https://github.com/sensepost/routopsy) - Toolkit to attack DRP & FHRP.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mTorPylle[0m[38;5;12m (https://github.com/cea-sec/TorPylle) - Implementation of the OR (TOR) protocol.[39m
|
||||
|
||||
[38;5;12mUnit Tests[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mLinux Kernel[0m[38;5;12m (https://github.com/torvalds/linux/blob/master/tools/testing/selftests/tc-testing/plugin-lib/scapyPlugin.py) - Linux Traffic Control (tc) testing suite.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mOpenBSD[0m[38;5;12m [39m[38;5;12m(https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dscapy%2Brepo%253Aopenbsd%252Fsrc%2Bpath%253Aregress%252F%26type%3DCode%26ref%3Dadvsearch%26l%3D%26l%3D)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIPv6[39m[38;5;12m [39m[38;5;12mstack[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m
|
||||
[38;5;12msuite.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mOpenBSD[0m[38;5;12m [39m[38;5;12m(https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dscapy%2Brepo%253Aopenbsd%252Fsrc%2Bpath%253Aregress%252F%26type%3DCode%26ref%3Dadvsearch%26l%3D%26l%3D)[39m[38;5;12m [39m[38;5;12m-[39m
|
||||
[38;5;12mIPv6[39m[38;5;12m [39m[38;5;12mstack[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12msuite.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRIOT-OS[0m[38;5;12m (https://github.com/RIOT-OS/RIOT/search?l=Python&q=scapy&type=Code) - RIOT OS networking testing suite.[39m
|
||||
|
||||
[38;5;12mVisualization[39m
|
||||
@@ -86,10 +86,10 @@
|
||||
|
||||
[38;5;12m2020[39m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCVE-2020-25577[0m[38;5;12m [39m[38;5;12m(https://blog.quarkslab.com/bad-neighbor-on-freebsd-ipv6-router-advertisement-vulnerabilities-in-rtsold-cve-2020-25577.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mBad[39m[38;5;12m [39m[38;5;12mNeighbor[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mFreeBSD:[39m[38;5;12m [39m[38;5;12mIPv6[39m[38;5;12m [39m[38;5;12mRouter[39m[38;5;12m [39m[38;5;12mAdvertisement[39m[38;5;12m [39m[38;5;12mVulnerabilities[39m[38;5;12m [39m
|
||||
[38;5;12min[39m[38;5;12m [39m[38;5;12mrtsold.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCVE-2020-16898[0m[38;5;12m [39m[38;5;12m(https://blog.quarkslab.com/beware-the-bad-neighbor-analysis-and-poc-of-the-windows-ipv6-router-advertisement-vulnerability-cve-2020-16898.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mBeware[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mBad[39m[38;5;12m [39m[38;5;12mNeighbor:[39m[38;5;12m [39m[38;5;12mAnalysis[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mPoC[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m
|
||||
[38;5;12mthe[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12mIPv6[39m[38;5;12m [39m[38;5;12mRouter[39m[38;5;12m [39m[38;5;12mAdvertisement[39m[38;5;12m [39m[38;5;12mVulnerability.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCVE-2020-25577[0m[38;5;12m [39m[38;5;12m(https://blog.quarkslab.com/bad-neighbor-on-freebsd-ipv6-router-advertisement-vulnerabilities-in-rtsold-cve-2020-25577.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mBad[39m[38;5;12m [39m[38;5;12mNeighbor[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mFreeBSD:[39m[38;5;12m [39m[38;5;12mIPv6[39m[38;5;12m [39m[38;5;12mRouter[39m[38;5;12m [39m
|
||||
[38;5;12mAdvertisement[39m[38;5;12m [39m[38;5;12mVulnerabilities[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mrtsold.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCVE-2020-16898[0m[38;5;12m [39m[38;5;12m(https://blog.quarkslab.com/beware-the-bad-neighbor-analysis-and-poc-of-the-windows-ipv6-router-advertisement-vulnerability-cve-2020-16898.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mBeware[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mBad[39m[38;5;12m [39m[38;5;12mNeighbor:[39m[38;5;12m [39m
|
||||
[38;5;12mAnalysis[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mPoC[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12mIPv6[39m[38;5;12m [39m[38;5;12mRouter[39m[38;5;12m [39m[38;5;12mAdvertisement[39m[38;5;12m [39m[38;5;12mVulnerability.[39m
|
||||
|
||||
[38;5;12m2019[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCVE-2019-5597[0m[38;5;12m (https://www.synacktiv.com/ressources/Synacktiv_OpenBSD_PacketFilter_CVE-2019-5597_ipv6_frag.pdf) - IPv6 fragmentation vulnerability in OpenBSD Packet Filter.[39m
|
||||
@@ -102,7 +102,8 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mkrackattacks-scripts[0m[38;5;12m (https://github.com/vanhoefm/krackattacks-scripts) - Test if clients or access points (APs) are affected by the KRACK attack against WPA2.[39m
|
||||
|
||||
[38;5;12m2016[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCVE-2016-6366[0m[38;5;12m (https://github.com/RiskSense-Ops/CVE-2016-6366) - The EXTRABACON exploit, a remote code execution for Cisco ASA written by the Equation Group (NSA) and leaked by the Shadow Brokers.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCVE-2016-6366[0m[38;5;12m [39m[38;5;12m(https://github.com/RiskSense-Ops/CVE-2016-6366)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mEXTRABACON[39m[38;5;12m [39m[38;5;12mexploit,[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mremote[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mexecution[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mCisco[39m[38;5;12m [39m[38;5;12mASA[39m[38;5;12m [39m[38;5;12mwritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mEquation[39m[38;5;12m [39m[38;5;12mGroup[39m[38;5;12m [39m[38;5;12m(NSA)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mleaked[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mShadow[39m[38;5;12m [39m
|
||||
[38;5;12mBrokers.[39m
|
||||
|
||||
[38;5;12mMisc[39m
|
||||
[38;5;12m- [39m[38;5;14m[1misf[0m[38;5;12m (https://github.com/dark-lbp/isf) - ISF (Industrial Control System Exploitation Framework). A suite that provides exploits various industrial protocols.[39m
|
||||
|
||||
Reference in New Issue
Block a user