Services
Explore Network Interactions
Last updated
Explore Network Interactions
Last updated
Respond to DNS queries with the specified IP address.
Website:
Author: Mike Murr: mike@socialexploits.com,
License: Apache License 2.0
Notes: Use the -h
parameter to display usage and help details.
State File:
Respond to DNS queries in a controlled way.
Website: Author: Didier Stevens: License: Public Domain State File:
Intercept and examine SMTP email activity with this fake SMTP server.
Website: Author: Oliver Cope License: Apache License 2.0: State File:
Accept connections to all IPv4 and IPv6 addresses and redirect it to the corresponding local port.
Website: Author: Lenny Zeltser, with input from the community License: GNU General Public License (GPL) v3+ Notes: accept-all-ips <start|stop> State File:
Read and write data across network connections.
Web server
Examine IRC activity with this IRC server.
Emulate common network services and interact with malware.
Emulate common network services and interact with malware.
Website: Author: Hobbit, Mike Frysinger, a3alex, Anatoly Techtonik License: Public Domain Notes: nc State File:
Website: Author: Igor Sysoev, Nginx Inc. License: Free, custom license: Notes: The webroot directory is /var/www/html. Control the daemon using: httpd <start|stop|status|restart>. State File:
Website: Author: InspIRCd Development Team License: GNU General Public License (GPL) v2: State File:
Website: Author: Thomas Hungenberg, Matthias Eckert License: GNU General Public License (GPL) v3 Notes: inetsim State File:
Website:
Author: FireEye Inc, Peter Kacherginsky, Michael Bailey:
License: Apache License 2.0:
Notes: Run the tool using sudo fakenet
. First, edit /usr/local/lib/python2.7/dist-packages/fakenet/configs/default.ini
, changing the LinuxRestrictInterface
parameter to your Ethernet network interface name, such as ens33
.
State File: