 SMB-Session-Spoofing
 SMB-Session-Spoofing 
 SMB spoofer
 Creates a fake SMB session to lure attackers into accessing a honey-device
118 stars
 4 watching
 16 forks
 
Language: C++ 
last commit: about 2 years ago  Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | A tool that allows users to spoof various aspects of their Windows system configuration, including hardware IDs, registry values, and system information. | 1,362 | 
|  | A container repository for storing and sharing public web hacking techniques and tools. | 1,953 | 
|  | Automates information gathering via web search engines using predefined categories of dorks. | 375 | 
|  | Exploits a vulnerability in SMBv3 compression to achieve privilege escalation and process manipulation. | 68 | 
|  | An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts. | 1,053 | 
|  | A honeypot solution that detects and analyzes SMB protocol interactions to identify potential security threats. | 47 | 
|  | Automates SMB relay attacks to gain shell access on systems with disabled SMB signing | 148 | 
|  | A tool for mocking SMTP servers in test environments. | 67 | 
|  | An exploit tool for a Windows SMBv3 vulnerability | 1,303 | 
|  | A .Net Fake SMTP Server clone that allows developers to test email interactions in isolation. | 125 | 
|  | Automated script for simulating and replaying CAN bus packets to practice car hacking or testing | 121 | 
|  | A command-line interface for searching and interacting with the StackExchange network | 1,362 | 
|  | Catches spoofed NBNS responses to prevent network attacks | 49 | 
|  | Enables mocking HTTP servers during test development in k6 tests | 13 | 
|  | Exploits default Windows configuration to take control of DNS and redirect traffic to an attacker's machine. | 1,728 |