An automated Wireless RogueAP MITM attack framework.
☆186May 9, 2019Updated 6 years ago
Alternatives and similar repositories for PRISM-AP
Users that are interested in PRISM-AP are comparing it to the libraries listed below
Sorting:
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆205Sep 27, 2021Updated 4 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 4 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆740Mar 5, 2024Updated last year
- Fast subdomains enumeration tool for penetration testers☆14Feb 3, 2020Updated 6 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- Quickly analyze and reverse engineer Android packages☆835Dec 21, 2022Updated 3 years ago
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- Automatically brute force all services running on a target.☆2,222Aug 18, 2024Updated last year
- Pentesting suite for Maltego based on data in a Metasploit database☆150Jun 24, 2018Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆17Jun 27, 2022Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,780Nov 24, 2024Updated last year
- MassBleed SSL Vulnerability Scanner☆245Apr 18, 2020Updated 5 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Network Pivoting Toolkit☆457Aug 26, 2023Updated 2 years ago
- Malicious Macro Generator☆828Apr 17, 2019Updated 6 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆98Sep 27, 2021Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆38Jan 24, 2020Updated 6 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Sep 6, 2019Updated 6 years ago
- Retrieve IP Geolocation information☆12Feb 20, 2021Updated 5 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago