WPS scan and pwn tool
☆70Nov 12, 2019Updated 6 years ago
Alternatives and similar repositories for wpsik
Users that are interested in wpsik are comparing it to the libraries listed below
Sorting:
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- WPS hacking scripts☆286Feb 21, 2024Updated 2 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Tools and scripts dedicated to Android application security☆53Mar 3, 2021Updated 5 years ago
- Tools, scripts and patches for Atheros wireless☆28Dec 21, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 8 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- RDP pentest tools & scripts☆67May 13, 2020Updated 5 years ago
- ☆49Mar 31, 2016Updated 9 years ago
- ATM security list☆13Aug 10, 2020Updated 5 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Oct 22, 2016Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Misc scripts and tools for WiFi☆106Jun 18, 2021Updated 4 years ago
- GSM hacking tools and scripts☆57Jul 22, 2020Updated 5 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ARCANUS is a customized payload generator/handler.☆145Feb 27, 2018Updated 8 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Sep 26, 2016Updated 9 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆268Jul 29, 2016Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- SDR tools and scripts☆83Jan 29, 2020Updated 6 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 8 years ago