update lists
This commit is contained in:
@@ -16,7 +16,7 @@ topics</a> on GitHub!</p>
|
||||
<li><a href="#exploits">Exploits</a></li>
|
||||
</ul>
|
||||
<h2 id="tools">Tools</h2>
|
||||
<p><em>Tools that use Scapy (a lot) or extend it</em></p>
|
||||
<p>Tools that use Scapy (a lot) or extend it.</p>
|
||||
<p>Fun - <a
|
||||
href="https://github.com/evilsocket/pwnagotchi">pwnagotchi</a> - Your AI
|
||||
pet that hacks WiFI to grow. It’s super cute.</p>
|
||||
@@ -28,6 +28,9 @@ href="https://github.com/calebmadrigal/trackerjacker">trackerjacker</a>
|
||||
monitoring. - <a
|
||||
href="https://github.com/wifiphisher/wifiphisher">wifiphisher</a> -
|
||||
Create rogue access point.</p>
|
||||
<p>Wireless - <a
|
||||
href="https://github.com/whad-team/whad-client">WHAD</a> - A powerful
|
||||
framework to perform various kinds of Wireless attacks.</p>
|
||||
<p>IPv6 - <a href="https://github.com/aatlasis/Chiron">Chiron</a> - An
|
||||
IPv6 security assessment framework. - <a
|
||||
href="https://github.com/fox-it/mitm6">mitm6</a> - Performs MiTM for
|
||||
@@ -95,10 +98,20 @@ href="https://github.com/gpotter2/scapy-benchmarks">scapy-benchmarks</a>
|
||||
brute force SSH public-key authentication. - <a
|
||||
href="https://github.com/0xInfection/TIDoS-Framework">TIDoS
|
||||
Framework</a> - The Offensive Manual Web Application Penetration Testing
|
||||
Framework.</p>
|
||||
Framework. - <a href="https://github.com/nxenon/h2spacex">h2spacex</a> -
|
||||
HTTP/2 low level library based on Scapy which can be used for Single
|
||||
Packet Attack (Race Condition on H2).</p>
|
||||
<h2 id="exploits">Exploits</h2>
|
||||
<p><em>Exploits that use Scapy. This does not count the ones included by
|
||||
default</em></p>
|
||||
<p>Exploits that use Scapy. This does not count the ones included by
|
||||
default</p>
|
||||
<p>2024</p>
|
||||
<ul>
|
||||
<li><a
|
||||
href="https://github.com/gpotter2/CVE-2024-20674">CVE-2024-20674</a> -
|
||||
Windows Kerberos Bypass leading to RCE.</li>
|
||||
<li><a href="https://github.com/TheOfficialFloW/PPPwn">PPPwn
|
||||
(CVE-2006-4304)</a> - Playstation 4 PPPoE RCE.</li>
|
||||
</ul>
|
||||
<p>2022</p>
|
||||
<ul>
|
||||
<li><a href="http://blog.champtar.fr/VLAN0_LLC_SNAP">CVE-2021-28444</a>
|
||||
@@ -144,3 +157,5 @@ by the Equation Group (NSA) and leaked by the Shadow Brokers.</p>
|
||||
<p>Misc - <a href="https://github.com/dark-lbp/isf">isf</a> - ISF
|
||||
(Industrial Control System Exploitation Framework). A suite that
|
||||
provides exploits various industrial protocols.</p>
|
||||
<p><a href="https://github.com/secdev/awesome-scapy">scapy.md
|
||||
Github</a></p>
|
||||
|
||||
Reference in New Issue
Block a user