rtpflood
rtpflood Package Description A command line tool used to flood any device that is processing RTP. rtpflood Homepage | Kali rtpflood Repo Author: Mark D. Collier, Mark O’Brien License: GPLv2 Tools...
View ArticleReaver
Reaver Package Description Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in...
View Articlemdk3
mdk3 Package Description MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. IMPORTANT: It is your responsibility to make sure you have permission from the network owner...
View Articleipv6-toolkit
ipv6-toolkit Package Description The SI6 Networks’ IPv6 toolkit is a set of IPv6 security assessment and trouble-shooting tools. It can be leveraged to perform security assessments of IPv6 networks,...
View Articleinviteflood
inviteflood Package Description A tool to perform SIP/SDP INVITE message flooding over UDP/IP. It was tested on a Linux Red Hat Fedora Core 4 platform (Pentium IV, 2.5 GHz), but it is expected this...
View ArticleInundator
Inundator Package Description Inundator is a multi-threaded, queue-driven, anonymous intrusion detection false positives generator with support for multiple targets. Source:...
View Articleiaxflood
iaxflood Package Description A UDP Inter-Asterisk_eXchange (i.e. IAX) packet was captured from an IAX channel between two Asterisk IP PBX’s. The content of that packet is the source of the payload for...
View ArticleFunkLoad
FunkLoad Package Description FunkLoad is a functional and load web tester, written in Python, whose main use cases are: Functional testing of web projects, and thus regression testing as well....
View ArticleDoona
Doona Package Description Doona is a fork of the Bruteforce Exploit Detector Tool (BED). BED is a program which is designed to check daemons for potential buffer overflows, format string bugs etc....
View ArticleDHCPig
DHCPig Package Description DHCPig initiates an advanced DHCP exhaustion attack. It will consume all IPs on the LAN, stop new users from obtaining IPs, release any IPs in use, then for good measure...
View Article