A framework for intrusion testing and intra-network attacks Writed With Python Tested On Linux OS
This framework is being developed by Amir Hossein Tangsiri Nezhad
➜ ~ git clone https://github.com/AmirHoseinTnagsiriNET/NetKnife
➜ ~ cd NetKnife
➜ NetKnife git:(master) python NetKnife.py
This tool is used to implement the Arp Cache Poisoning attack on the target
This tool is used to create fake access points
SSID Hidden Locator Tools:
This tool is responsible for finding Wireless and Access Point devices that are hidden
This tool is used to convert Plain-Text texts to Cipher-Text texts using Hash algorithms.
This tool is used to implement the Syn Flooding attack, which is a Denial-Of-Service attack
This tool is used to record ongoing traffic from the interface
This tool is used to detect the Mac and SSID addresses of AP and Wireless devices
This tool changes the general IP address of your system once every 3 seconds using the Tor service. Note: This tool is missing on Linux systems along with System-D
This tool is used to implement the Deauthentication attack on Wirelss networks
This tool is used to scan Tcp protocol ports. This tool, unlike similar tools in other frameworks, has a higher scanning power
This tool is used to scan IP addresses and Mac addresses of active devices within the network
This tool is used for Mac Flooding attacks on Layer 2 networks. Attacks such as CAM / MAC Table OverFlow can be implemented with this tool
This tool is used to detect Arp Cache Poisoning attacks If your system is attacked by Arp Cache Poisoning, it will notify you if this tool is running
This tool is used for Layer 2 network attacks for unauthorized access to other vlan This tool is used to implement Vlan hopping attack through Double Tagging Method
This tool is used to implement Get Request Http Flooding attacks