Responder
LLMNR/NBT-NS/mDNS poisoner and rogue server suite for credential capture in internal test networks.
Why it is included
Classic lab tool for demonstrating broadcast name-resolution abuse on Windows networks.
Best for
Isolated VLAN labs and internal pentests with written approval.
Strengths
- Protocol coverage
- Hash capture
- Well known in training
Limitations
- Illegal on networks you do not own; detectable
Good alternatives
mitm6 · Custom Scapy
Related tools
Security & Privacy
mitmproxy
Interactive TLS-capable HTTP(S) proxy with console, web, and scriptable interception.
Security & Privacy
bettercap
Network attack framework: Wi-Fi, BLE, LAN recon, ARP/DNS spoofing, proxy, and modular caplets.
Security & Privacy
Impacket
Python classes and scripts for low-level Windows network protocols (SMB, MSRPC, Kerberos, LDAP, etc.).
Security & Privacy
NetExec
Network post-exploitation Swiss Army knife for SMB/WinRM/LDAP/MSSQL/WMI—successor spirit to CrackMapExec.
Security & Privacy
evil-winrm
Ruby WinRM shell for pentesting: remote commands, file upload, Pass-the-Hash, and menu helpers.
Security & Privacy
Metasploit Framework
Modular exploitation framework with payloads, encoders, auxiliaries, and integration points for exploit development.
