This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1320
pythem
External Tool
External Data Source
GitHub
Unknown
Unknown
55 (lowest rank is 55)

Category & Restrictions

Other
simulated attacks, cyber attack, penetration testing, cyber defense
Unrestricted
true

Description


pythem is a multi-purpose pentest framework written in Python.

pythem can test multiple different types of attacks and phishing instances such as:

ARP spoofing - Man-in-the-middle.
ARP+DNS spoof - fake page redirect to credential harvester
DHCP ACK Injection spoofing - Man-in-the-middle
Man-in-the-middle inject BeEF hook
SSH Brute-Force attack.
Web page formulary brute-force
URL content buster
Overthrow the DNS of LAN range/IP address
Redirect all possible DNS queries to host
Get Shellcode from binary
Filter strings on pcap files
Exploit Development 1: Overwriting Instruction Pointer
Exploit Development 2: Ret2libc

Additional Details

22.9MB
false
Unknown
web scraping, cybercrime, web browser, network analyzers, spamming, computer memory, cryptographic protocol, world wide web, application layer protocols, web design, computer security procedures, external data source, cryptographic software, hacking, touchscreens, pcap, return to libc attack, domain name system, pythem, overwriting, internet governance, multi touch, phishing, shellcode, remote administration software, injection exploits, dynamic host configuration protocol, web page, brute force attack, inferlink corporation, hotlist, processor, penetration test, ssh communications security, history of computing, web crawlers, geosocial networking, secure shell, ip address, online bookmarking services, 1320, program counter, arp spoofing, cryptanalysis, exploit