This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1320
pythem
External Tool
External Data Source
GitHub
Unknown
Unknown
56 (lowest rank is 56)

Category & Restrictions

Other
simulated attacks, cyber attack, penetration testing, cyber defense
Unrestricted
true

Description


pythem is a multi-purpose pentest framework written in Python.

pythem can test multiple different types of attacks and phishing instances such as:

ARP spoofing - Man-in-the-middle.
ARP+DNS spoof - fake page redirect to credential harvester
DHCP ACK Injection spoofing - Man-in-the-middle
Man-in-the-middle inject BeEF hook
SSH Brute-Force attack.
Web page formulary brute-force
URL content buster
Overthrow the DNS of LAN range/IP address
Redirect all possible DNS queries to host
Get Shellcode from binary
Filter strings on pcap files
Exploit Development 1: Overwriting Instruction Pointer
Exploit Development 2: Ret2libc

Additional Details

22.9MB
false
Unknown
pythem, 1320, external data source, external, inferlink corporation, inferlink, corporation, source, multi, python, purpose, written, framework, pentest, dns, middle, redirect, arp, force, exploit, spoofing, brute, development, queries, pcap, inject, overthrow, overwriting, fake, dhcp, instruction, types, filter, shellcode, multiple, injection, url, attack, web, pointer, phishing, host, lan, attacks, credential, hook, harvester, beef, ssh, test, ret2libc, strings, content, range, instances, spoof, other, buster, formulary, files, binary, ack