Query the NetBIOS name tables for both the local computer and remote computers.
-
Updated
Oct 14, 2022 - C
Query the NetBIOS name tables for both the local computer and remote computers.
Powerful Keylogger Coded in C🔑, that collects exactly what the user types.
A penetration testing playbook that's suitable for CTF challenges, bug bounty hunting and red team assessments.
An application that utilizes the DPDK to send network packets. Used for penetration testing including Denial of Service (DoS), and network monitoring.
HeadHunter Command and Control (C2) Framework
A cheap "bad" USB using a Raspberry Pi Pico running on Lua.
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
An application that utilizes fast AF_XDP Linux sockets to generate and send network packets. Used for penetration testing including Denial of Service (DoS) and network monitoring.
Modular personalized dictionary generator.
Add a description, image, and links to the penetration-testing-tools topic page so that developers can more easily learn about it.
To associate your repository with the penetration-testing-tools topic, visit your repo's landing page and select "manage topics."