MFSniffer
TSO sniffer
Scripts to sniff and extract unencrypted TSO login credentials from mainframe networks
Mainframe TN3270 unencrypted TSO session user ID and password sniffer
47 stars
8 watching
18 forks
Language: Python
last commit: over 1 year ago Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of network auditing and penetration testing tools that sniff various protocols to reveal security vulnerabilities. | 191 |
| Programs to capture IP packets on Windows without kernel driver support | 181 |
| An interactive tool to enumerate and brute-force user credentials on IBM mainframes | 17 |
| Automates brute force attempts on network devices using SNMP protocol | 298 |
| A MIME type sniffer written in Go that determines the type of given data based on its file signature or content type. | 33 |
| Captures and saves unencrypted RDP packets to a PCAP file for later analysis | 27 |
| Tools to capture and analyze communication between real Gameboy devices and printers | 9 |
| Automated tool to brute-force default credentials on found services from scanner output | 2,053 |
| Checks if a password has been compromised in data breaches by hashing a partial part of the password and searching for it against a database | 24 |
| Script to track malware IOCs using OSINT on Twitter | 52 |
| A process-aware network capture tool using eBPF technology | 679 |
| Automates the process of trying all possible combinations of service credentials on a target system to gain unauthorized access. | 1,990 |
| A C# toolkit designed to extract credentials and browsing history from Windows systems. | 295 |
| Tools and scripts for cracking custom network authentication systems | 402 |
| Analyzes and processes NTFS file system data to extract timeline information and run YARA rules for malware detection. | 12 |