|It works like a Swiss army knife for network attacks and monitoring. It is a tool for network capture, analysis, and MITM attacks.
|Burp Suit is a platform for security testing of web applications.
|It is a highly configurable DNS proxy for Penetration Testers and Malware Analyst.
|It is a Cisco VPN attack tool that is used to attack insecure Cisco VPN PSK+XAUTH based IPsec authentication setups, which are called as semi MitM attack.
|It is a side-jacking tool that acts like a proxy server that replaces your cookies with session cookies stolen from somebody else.
|It is a hexadecimal packet injector or sniffer which is capable of reading, intercepting, and modifying network traffic in a transparent manner.
|It is a VOIP flooder tool.
|It is a SIP/SDP INVITE message flooding over UDP/IP.
|This tool tests for SMTP user enumeration, internal spoofing, and relay.
|It is an Evilgrade framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.
|It is an HTTP proxy that provides a console interface that allows traffic flows to be inspected and edited.
|It is an RTP fuzzer that reads SIP messages to get information about the RTP port numbers.
|It evaluates the implementation level security and robustness of Session Initiation Protocol implementation.
|It is a DNS rebinding tool that implements the multiple A record DNS rebinding attack.
|It is an LLMNR and NBT-NS responder which answers to specific NBT-NS queries based on their name suffix.
|It detects, reconstructs and analyses RTP sessions
|This tool is used to insert audio into a specified stream.
|It is a tool to mix pre-recorded audio in real-time with the audio in the specified target audio stream.
|It is a fuzzer that searches for cross site scripting SQL injection, log injection, format strings, buffer overflow, etc
|It is a traffic generator for the SIP protocol.
|It is an online password cracker that is used to audit SIP based VoIP systems.
|It is a transparent TCP connection scrambler that delays, modify and inject fake packets inside your transmission.
|It is a transparent and scalable SSL/ TLS interception used for man-in-the -middle attacks against SSL/TLS encrypted network connections.
|It is an SSL/TLS man-in-the-middle attack tool that is used to hijack HTTP traffic on a network transparently.
|It converts a MAC or IPv4 address to an IPv6 address.
|It mimics the behaviour of IP phones to rapidly run a VLAN hop into the voice VLAN on specific Ethernet switches.
|It is a web application review tool used to expose the working of an HTTP based application.
|It creates five monitor mode interfaces, in which four are used as access points, and the fifth is used for airodump-ng.
|It is a network protocol/traffic analyser. It allows us to monitor our network at a microscopic level.
|It is a keystroke sniffer that sniffs keystrokes on remote or local X-Windows servers.
|It is a penetration testing tool for finding vulnerabilities in web applications.