evilsocket
|
31895569f7
|
misc: refactored modules.findMAC to session.FindMAC
|
2019-01-18 20:13:41 +01:00 |
|
evilsocket
|
b57e329632
|
misc: small fix or general refactoring i did not bother commenting
|
2018-08-25 11:50:23 +02:00 |
|
evilsocket
|
e9fa015962
|
fix: do not probe while arp.spoofing, fixes arp.spoof on the whole subnet
|
2018-05-10 10:39:56 +02:00 |
|
evilsocket
|
9f390a722f
|
new: added arp.spoof.internal boolean parameter (closes #242)
|
2018-04-30 15:44:16 +02:00 |
|
evilsocket
|
7919cda5ec
|
lint driven refactoring
|
2018-04-24 16:33:38 +02:00 |
|
evilsocket
|
43b7e8243f
|
fix: made a warning log as a debug log to avoid causing confusion about MAC lookup of offline addresses
|
2018-03-28 11:56:56 +02:00 |
|
evilsocket
|
da2d837dfb
|
fix: using active udp probes if arp.spoof fails to resolve an IP to its MAC
|
2018-03-27 10:39:20 +02:00 |
|
evilsocket
|
6c50cc2918
|
new: added new arp.spoof.whitelist variable which supports macs, ips, ip ranges and aliases (closes #205)
|
2018-03-26 11:58:31 +02:00 |
|
evilsocket
|
54607993ba
|
new: aliases can now be used along with MACs and IP ranges for the arp.spoof.targets variable (ref #204)
|
2018-03-26 11:38:22 +02:00 |
|
Giulio De Pasquale
|
a151e63497
|
Multiple IPs are now correctly parsed
|
2018-03-13 10:32:39 -07:00 |
|
Kuba Gretzky
|
2d0619274b
|
fix: error when arp.spoof.targets contained only MAC addresses
|
2018-02-28 20:01:44 +01:00 |
|
evilsocket
|
b1dc729c79
|
fix: properly synchronizing modules stop action with waitGroups
|
2018-02-27 12:53:40 +01:00 |
|
alexmozzhakov
|
fca3e29b06
|
Fix arp.spoof incorrect handling
|
2018-02-27 09:24:12 +02:00 |
|
evilsocket
|
536614068c
|
misc: small fix or general refactoring i did not bother commenting
|
2018-02-26 14:08:12 +01:00 |
|
evilsocket
|
3926f52f2d
|
new: the arp.spoof.targets variable now supports MAC addresses as well (closes #87)
|
2018-02-26 13:12:24 +01:00 |
|
evilsocket
|
63cea73f8e
|
misc: small fix or general refactoring i did not bother commenting
|
2018-02-23 00:07:09 +01:00 |
|
evilsocket
|
ee4d1e9b8a
|
misc: small fix or general refactoring i did not bother commenting
|
2018-02-22 21:59:13 +01:00 |
|
evilsocket
|
ce76c7258d
|
new: implemented syn.scan module (closes #67)
|
2018-02-22 21:20:36 +01:00 |
|
evilsocket
|
48d27f274a
|
refact: renamed package net to network to avoid collision with golang net package.
|
2018-02-15 21:34:46 +01:00 |
|
evilsocket
|
c2cd198d37
|
misc: small fix or general refactoring i did not bother commenting
|
2018-02-11 20:55:22 +01:00 |
|
evilsocket
|
e57b94ee5d
|
misc: small fix or general refactoring i did not bother commenting
|
2018-02-11 20:17:43 +01:00 |
|
evilsocket
|
9c6eb70eb3
|
refact: refactored module SetRunning method (fixes #49)
|
2018-02-11 01:43:48 +01:00 |
|
evilsocket
|
f2f07959bc
|
new: arp.ban command to use arp spoofer in ban mode
|
2018-02-10 03:32:18 +01:00 |
|
evilsocket
|
d57ae3637c
|
fix: enable packet forwarding whenever any spoofing module is started (ref #10)
|
2018-01-27 15:58:53 +01:00 |
|
onura
|
4679521d9a
|
fix: Add missing NormalizeMac call while arp_spoof getMac. (ref #10)
|
2018-01-25 15:51:21 +03:00 |
|
evilsocket
|
f9f0f3d5b3
|
fix: several improvements to the https.proxy module
|
2018-01-14 19:34:15 +01:00 |
|
evilsocket
|
291e87de39
|
refact: some refactoring to proxy modules
|
2018-01-11 19:53:14 +01:00 |
|
evilsocket
|
e543582257
|
refact: refactored module parameters api
|
2018-01-11 00:27:53 +01:00 |
|
evilsocket
|
31de46c14c
|
new: improved menu and per module help
|
2018-01-09 22:23:11 +01:00 |
|
evilsocket
|
e36bcacf00
|
refact: centralized logging into log package using Session singleton instance
|
2018-01-08 12:25:26 +01:00 |
|
evilsocket
|
64221a126d
|
refact: session/modules -> modules
|
2018-01-08 09:28:46 +01:00 |
|