Pyersinia alternatives

Looking for an alternative tool to replace Pyersinia? During the review of Pyersinia we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Yersinia (network attack and testing tool)
  2. IVRE (reconnaissance for network traffic)
  3. Wireshark (network traffic analyzer)

These tools are ranked as the best alternatives to Pyersinia.

Alternatives (by score)

70

Yersinia

Introduction

The Yersinia tool takes advantage of known weaknesses in several network protocols. It helps with trying to abuse the weaknesses to ensure that network protections are implemented where possible.

Related protocols:

  • Spanning Tree Protocol (STP)
  • Cisco Discovery Protocol (CDP)
  • Dynamic Trunking Protocol (DTP)
  • Dynamic Host Configuration Protocol (DHCP)
  • Hot Standby Router Protocol (HSRP)
  • 802.1q
  • 802.1x
  • Inter-Switch Link Protocol (ISL)
  • VLAN Trunking Protocol (VTP)

Project details

78

IVRE

Introduction

IVRE is a framework to perform reconnaissance for network traffic. It leverages other tools to pull in the data and show it in the web interface.

Project details

IVRE is written in Python.

Strengths and weaknesses

  • + More than 10 contributors
  • + More than 1000 GitHub stars
  • + The source code of this software is available

    Typical usage

    • Digital forensics
    • Information gathering
    • Intrusion detection
    • Network analysis

    IVRE review

    67

    Wireshark

    Introduction

    Wireshark is a mature project with many users all over the world. Its library is stable and can be used by both graphical as text-based interfaces. With many books and even conferences around the subject, this tool is a safe bet to have in your toolbox.

    Project details

    Wireshark is written in C.

    Strengths and weaknesses

    • + The source code of this software is available
    • + Well-known tool

      Typical usage

      • Network analysis
      • Network traffic analysis
      • Security assessment
      • Troubleshooting

      Wireshark review

      63

      Zenmap

      Introduction

      Zenmap is a graphical user interface (GUI) for Nmap. It can be of great help to start a network scan by simply selecting the options you want. Besides Linux, it also runs on Microsoft Windows, macOS, BSD, and other flavors of Unix.

      One of the strengths of Zenmap is the ability to store profiles, which can be reused for later scans. The command creator is another one, which helps interactively create the right nmap commands. Recent scans are stored in a searchable database and scan results can be saved and compared.

      Project details

      Zenmap is written in Python.

      Strengths and weaknesses

      • + The source code of this software is available
      • + Well-known tool

        Typical usage

        • Network scanning
        • Penetration testing
        • Port scanning
        • Security assessment

        Zenmap review

        64

        Dockerscan

        Introduction

        Dockerscan is a Docker toolkit for security analysis which includes attacking tools. It is more focused on side of the offensive than defensive.

        Project details

        Dockerscan is written in Python.

        Strengths and weaknesses

        • + More than 500 GitHub stars
        • + The source code of this software is available

          Typical usage

          • Information gathering
          • Security assessment
          • Vulnerability scanning

          Dockerscan review

          74

          Metasploit Framework

          Introduction

          Metasploit is a framework that consists of tools to perform security assignments. It focuses on the offensive side of security and leverages exploit modules.

          Project details

          Metasploit Framework is written in Ruby.

          Strengths and weaknesses

          • + More than 400 contributors
          • + More than 9000 stars
          • + Many maintainers
          • + The source code of this software is available
          • + Supported by a large company
          • + Well-known tool

            Typical usage

            • Penetration testing
            • Security assessment
            • Vulnerability scanning

            Metasploit Framework review

            64

            OWTF (Offensive Web Testing Framework)

            Introduction

            OWTF is short for Offensive Web Testing Framework and it is one of the many OWASP projects to improve security.

            Project details

            OWTF is written in Python.

            Strengths and weaknesses

            • + More than 25 contributors
            • + More than 500 GitHub stars
            • + The source code of this software is available

              Typical usage

              • Penetration testing
              • Security assessment

              OWTF review

              64

              RouterSploit

              Introduction

              RouterSploit is a framework to exploit embedded devices such as cameras and routers. It can be used during penetration testing to test the security of a wide variety of devices. RouterSploit comes with several modules to scan and exploit the devices. The tool helps in all steps, like from credential testing to deploying a payload to perform an exploitation attempt.

              Project details

              RouterSploit is written in Python.

              Strengths and weaknesses

              • + More than 50 contributors
              • + More than 6000 GitHub stars
              • + The source code of this software is available

                Typical usage

                • Penetration testing
                • Self-assessment
                • Software testing
                • Vulnerability scanning

                RouterSploit review

                60

                evilredis

                Introduction

                Evilredis tool is an offensive security program for pentesting Redis databases. It can scan the target and perform different actions, like shutting down a Redis instance.

                Project details

                evilredis is written in Node.js.

                Strengths and weaknesses

                • + The source code of this software is available

                  Typical usage

                  • Security assessment
                  • Vulnerability scanning

                  evilredis review

                  64

                  THC IPv6 Attack Toolkit (thc-ipv6)

                  Introduction

                  Tools:
                  - parasite6: ICMPv6 neighbor solitication/advertisement spoofer, puts you as man-in-the-middle, same as ARP MitM (and parasite)
                  - alive6: an effective alive scanng, which will detect all systems listening to this address
                  - dnsdict6: parallel DNS IPv6 dictionary brute-forcer
                  - fake_router6: announce yourself as a router on the network, with the highest priority
                  - redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever ICMPv6 redirect spoofer
                  - toobig6: mtu decreaser with the same intelligence as redir6
                  - detect-new-ip6: detect new IPv6 devices which join the network, you can run a script to automatically scan these systems etc.
                  - dos-new-ip6: detect new IPv6 devices and tell them that their chosen IP collides on the network (DOS).
                  - trace6: very fast traceroute6 with supports ICMP6 echo request and TCP-SYN
                  - flood_router6: flood a target with random router advertisements
                  - flood_advertise6: flood a target with random neighbor advertisements
                  - fuzz_ip6: fuzzer for IPv6
                  - implementation6: performs various implementation checks on IPv6
                  - implementation6d: listen daemon for implementation6 to check behind a firewall
                  - fake_mld6: announce yourself in a multicast group of your choice on the net
                  - fake_mld26: same but for MLDv2
                  - fake_mldrouter6: fake MLD router messages
                  - fake_mipv6: steal a mobile IP to yours if IPSEC is not needed for authentication
                  - fake_advertiser6: announce yourself on the network
                  - smurf6: local smurfer
                  - rsmurf6: remote smurfer, known to work only against Linux targets at the moment
                  - exploit6: known IPv6 vulnerabilities to test against a target
                  - denial6: a collection of denial-of-service tests against a target
                  - thcping6: sends a handcrafted ping6 packet
                  - sendpees6: a tool by willdamn@gmail.com, which generates a neighbor solicitation requests with a lot of CGAs (crypto) to keep the CPU busy.

                  Project details

                  THC IPv6 Attack Toolkit is written in C.

                  Strengths and weaknesses

                  • + Project is mature (10+ years)
                  • + The source code of this software is available

                    Typical usage

                    • Network analysis
                    • Penetration testing
                    • Security assessment

                    THC IPv6 Attack Toolkit review

                    52

                    ssldump

                    Introduction

                    ssldump is protocol analyzer for SSLv3/TLS network traffic. It identifies TCP connections on the chosen network interface and tries to interpret it.

                    Project details

                    Strengths and weaknesses

                    • + The source code of this software is available
                    • - No updates for a while

                    Typical usage

                    • Network analysis

                    ssldump review

                    Some relevant tool missing as an alternative to Pyersinia? Please contact us with your suggestion.