90N45-d3v / Pinacolada
Wireless Intrusion Detection System for Hak5's WiFi Coconut
☆31Updated 2 years ago
Alternatives and similar repositories for Pinacolada
Users that are interested in Pinacolada are comparing it to the libraries listed below
Sorting:
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Golang tool to help in forcing a license for HAK5 C2 Tool☆47Updated last year
- Social Engineering Browser Update Attack.☆57Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- WebHook for Red Team☆26Updated 4 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆16Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 9 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Red Team Stuffs☆19Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- Kali Packerge Manager☆59Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 11 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated 2 years ago
- Script to setup a phishing server on the cloud☆12Updated 4 years ago
- Windows offline filesystem hacking tool for Linux☆97Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- Enumeration & fingerprint tool☆24Updated last year