Merge pull request #304 from meitar/network-replay

Add new section ("Network Packet Replay…") with three tools.
This commit is contained in:
Meitar M 2019-07-26 14:45:10 -04:00 committed by GitHub
commit 078c5f8823
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -39,6 +39,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
* [Exfiltration Tools](#exfiltration-tools)
* [Network Reconnaissance Tools](#network-reconnaissance-tools)
* [Protocol Analyzers and Sniffers](#protocol-analyzers-and-sniffers)
* [Network Traffic Replay and Editing Tools](#network-traffic-replay-and-editing-tools)
* [Proxies and Machine-in-the-Middle (MITM) Tools](#proxies-and-machine-in-the-middle-mitm-tools)
* [Transport Layer Security Tools](#transport-layer-security-tools)
* [Wireless Network Tools](#wireless-network-tools)
@ -308,12 +309,9 @@ See also [awesome-industrial-control-system-security](https://github.com/hslatma
* [Zarp](https://github.com/hatRiot/zarp) - Network attack tool centered around the exploitation of local networks.
* [dnstwist](https://github.com/elceef/dnstwist) - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.
* [dsniff](https://www.monkey.org/~dugsong/dsniff/) - Collection of tools for network auditing and pentesting.
* [hping3](https://github.com/antirez/hping) - Network tool able to send custom TCP/IP packets.
* [impacket](https://github.com/CoreSecurity/impacket) - Collection of Python classes for working with network protocols.
* [pig](https://github.com/rafael-santiago/pig) - GNU/Linux packet crafting tool.
* [routersploit](https://github.com/reverse-shell/routersploit) - Open source exploitation framework similar to Metasploit but dedicated to embedded devices.
* [rshijack](https://github.com/kpcyrd/rshijack) - TCP connection hijacker, Rust rewrite of `shijack`.
* [scapy](https://github.com/secdev/scapy) - Python-based interactive packet manipulation program and library.
### DDoS Tools
@ -365,6 +363,16 @@ See also [awesome-industrial-control-system-security](https://github.com/hslatma
* [sniffglue](https://github.com/kpcyrd/sniffglue) - Secure multithreaded packet sniffer.
* [tcpdump/libpcap](http://www.tcpdump.org/) - Common packet analyzer that runs under the command line.
### Network Traffic Replay and Editing Tools
* [TraceWrangler](https://www.tracewrangler.com/) - Network capture file toolkit that can edit and merge `pcap` or `pcapng` files with batch editing features.
* [WireEdit](https://wireedit.com/) - Full stack WYSIWYG pcap editor (requires a free license to edit packets).
* [bittwist](http://bittwist.sourceforge.net/) - Simple yet powerful libpcap-based Ethernet packet generator useful in simulating networking traffic or scenario, testing firewall, IDS, and IPS, and troubleshooting various network problems.
* [hping3](https://github.com/antirez/hping) - Network tool able to send custom TCP/IP packets.
* [pig](https://github.com/rafael-santiago/pig) - GNU/Linux packet crafting tool.
* [scapy](https://github.com/secdev/scapy) - Python-based interactive packet manipulation program and library.
* [tcpreplay](https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
### Proxies and Machine-in-the-Middle (MITM) Tools
* [BetterCAP](https://www.bettercap.org/) - Modular, portable and easily extensible MITM framework.