An automated Wireless RogueAP MITM attack framework.
☆186May 9, 2019Updated 6 years ago
Alternatives and similar repositories for PRISM-AP
Users that are interested in PRISM-AP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆14Feb 3, 2020Updated 6 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆205Sep 27, 2021Updated 4 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆740Mar 5, 2024Updated 2 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆16Jun 27, 2022Updated 3 years ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- Retrieve IP Geolocation information☆12Feb 20, 2021Updated 5 years ago
- Quickly analyze and reverse engineer Android packages☆843Dec 21, 2022Updated 3 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- Automatically brute force all services running on a target.☆2,230Aug 18, 2024Updated last year
- MassBleed SSL Vulnerability Scanner☆247Apr 18, 2020Updated 5 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,781Nov 24, 2024Updated last year
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Jun 24, 2018Updated 7 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆98Sep 27, 2021Updated 4 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆27Feb 10, 2026Updated last month
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆38Jan 24, 2020Updated 6 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- JShell - Get a JavaScript shell with XSS.☆533May 5, 2019Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Oct 30, 2024Updated last year
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Feb 21, 2020Updated 6 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago