22 May 2007 | 21,089 views

Nemesis – Packet Injection Suite

Check For Vulnerabilities with Acunetix

Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting.

Nemesis can natively craft and inject packets for:

  • ARP
  • DNS
  • ICMP
  • IGMP
  • IP
  • OSPF
  • RIP
  • TCP
  • UDP

Using the IP and the Ethernet injection modes, almost any custom packet can be crafted and injected.

Unix-like systems require: libnet-1.0.2a, and a C compiler (GCC)
Windows systems require: libnetNT-1.0.2g and WinPcap

Download it here:

Source code: nemesis-1.4.tar.gz (Build 26)
Windows binary: nemesis-1.4.zip (Build 26) (includes LibnetNT)

You can read more here:

Nemisis at Sourceforge


Recent in Hacking Tools:
- OAT – Microsoft OCS Assessment Tool (Office Communication Server)
- SamuraiWTF 3.x And Onwards – Web Testing Framework Linux LiveCD
- Watcher – Passive Web Application Vulnerability Scanner

Related Posts:
- hackers playground… windows?
- LORCON (Loss Of Radio CONnectivity) 802.11 Packet Library
- SecurityCompass Exploit-Me – Firefox Web Application Testing Tools

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,904,361 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,135,615 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 640,571 views

Advertise on Darknet

3 Responses to “Nemesis – Packet Injection Suite”

  1. yzan 3 June 2007 at 11:01 am Permalink

    In the title and tags should be Nemesis rather than Nemisis.

  2. Darknet 3 June 2007 at 6:19 pm Permalink

    yzan: Thanks for the correction!

  3. Hanashi 3 June 2007 at 6:59 pm Permalink

    I’ve used Nemesis in the past, while teaching an IDS class. It’s a pretty good tool for creating arbitrary packets. I usually set up whatever header and payload the students need to detect, then just run it in a shell loop so it sends the same packets over and over. Works like a charm, and it’s pretty simple to get going.