yersinia

STP disruption tool

A framework for creating Layer 2 attacks to disrupt Spanning Tree protocols.

A framework for layer 2 attacks

GitHub

722 stars
33 watching
122 forks
Language: C
last commit: about 1 year ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
stratosphereips/manati A tool to assist threat analysts in discovering new security problems using machine learning 112
tomiaijo/scientist A C++ library for comparing the performance of alternative code paths. 35
fsecurelabs/timeinator An extension for Burp Suite that allows users to perform timing attacks over unreliable networks 21
mainframed/tshocker An FTP-based tool to execute malicious commands on a mainframe system using a CATSO/JCL wrapper 24
kapejod/rtpnatscan A command line tool to scan RTP proxies for vulnerabilities to NAT stealing attacks 24
mschwager/dhcpwn A tool used to test DHCP IP exhaustion attacks by sending spoofed UDP requests to a DHCP server. 667
sergiomarotco/azure-devops-server-supply-chain-attack-tree An attack tree model for identifying potential security vulnerabilities in an Azure DevOps Server supply chain. 7
tripwire/tardis An intelligence platform for threat analysis and incident response 121
cymmetria/strutshoneypot A honeypot designed to detect and prevent exploitation of a specific Apache Struts vulnerability 72
yqcs/zhetian A tool for bypassing antivirus detection and generating trojans to evade security measures 728
sk4la/plast A modular threat-hunting tool framework for detecting indicators of compromise in incident-response operations. 17
thunlp/openattack A Python toolkit for generating adversarial examples to test the robustness of natural language processing models 689
silascutler/virustotaltools Tools for interacting with Virus Total's Yara rule management system. 35
telefonica/attpwn A tool for simulating and analyzing potential security threats to Microsoft Windows systems using the MITRE ATT&CK framework. 208
p0cl4bs/wifipumpkin3 A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. 1,982