SMB-Session-Spoofing

SMB spoofer

Creates a fake SMB session to lure attackers into accessing a honey-device

GitHub

118 stars
4 watching
16 forks
Language: C++
last commit: about 1 year ago

Related projects:

Repository Description Stars
sechex/sechex-spoofy A tool that allows users to spoof various aspects of their Windows system configuration, including hardware IDs, registry values, and system information. 1,316
0xsobky/hackvault A container repository for storing and sharing public web hacking techniques and tools. 1,948
smaash/snitch Automates information gathering via web search engines using predefined categories of dorks. 373
rsmudge/cve-2020-0796-bof Exploits a vulnerability in SMBv3 compression to achieve privilege escalation and process manipulation. 68
mgeeky/threadstackspoofer An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts. 1,042
rosehgal/honeysmb A honeypot solution that detects and analyzes SMB protocol interactions to identify potential security threats. 46
jsitech/relayer Automates SMB relay attacks to gain shell access on systems with disabled SMB signing 148
mocktools/ruby-smtp-mock A tool for mocking SMTP servers in test environments. 67
danigargu/cve-2020-0796 An exploit tool for a Windows SMBv3 vulnerability 1,304
cmendible/netdumbster A .Net Fake SMTP Server clone that allows developers to test email interactions in isolation. 123
souravbaghz/canghost Automated script for simulating and replaying CAN bus packets to practice car hacking or testing 121
samtay/so A command-line interface for searching and interacting with the StackExchange network 1,357
netspi/spoofspotter A tool to detect and alert on spoofed NetBIOS name service responses 49
szkiba/xk6-mock Enables mocking HTTP servers during test development in k6 tests 14
dirkjanm/mitm6 Exploits default Windows configuration to take control of DNS and redirect traffic to an attacker's machine. 1,711