📅  最后修改于: 2021-01-05 05:02:31             🧑  作者: Mango
Tools | Description |
---|---|
DHCPig | IIt creates an advanced DHCP exhaustion attack. DHCPig consumes all IPs on the LAN, which resists users from obtaining IPs. |
FunkLoad | IIt is a functional and load web tester that launches a TCPWatch proxy and record activities over the network. |
iaxflood | IIt is a VOIP flooder tool. |
Inundator | IIt is an anonymous intrusion detection false positives generator with support for multiple targets. |
Inviteflood | IIt is a SIP/SDP INVITE message flooding over UDP/IP. |
ipv6-toolkit | IIt is a security assessment tool for the IPv6 flow label field. |
mdk3 | IMdk3 is a wireless attack tool for IEEE 802.11 networks. |
Reaver | IIt implements a brute-force attack against Wifi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases. |
Rtpflood | IA command-line tool used to flood any device that is processing RTP. |
SlowHTTPTest | IThis tool is used to test slow HTTP DoS vulnerabilities. |
t50 | IIt is a Multi-Protocol packet injector tool |
Termineter | IIt is a python smart meter Testing Framework that implements the C12.18 and C12.19 protocols for communication. |
THC-IPV6 | IIt is a complete toolset to attack the inherent protocol weaknesses of IPv6 and ICMP6. |
THC-SSL-DOS | IIt is a stress tester for the SSL handshake. |
Powersploit | IIt is a collection of Microsoft PowerShell modules that can be used to aid penetration tester during all phases of an assessment. |
WeBaCoo | It is a web backdoor script-kit, aiming to provide a stealth terminal-like connection over HTTP between client and web server. It is designed to operate under the radar of modern up-to-dated AV, NIDS, IPS, Network Firewalls and Application Firewalls, proving a stealth mechanism to execute system commands to the compromised server. |