90N45-d3v / PinacoladaLinks
Wireless Intrusion Detection System for Hak5's WiFi Coconut
☆31Updated 2 years ago
Alternatives and similar repositories for Pinacolada
Users that are interested in Pinacolada are comparing it to the libraries listed below
Sorting:
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆120Updated last year
- Social Engineering Browser Update Attack.☆57Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Modular framework to exploit UPS devices☆62Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆106Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆52Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆51Updated 7 months ago
- Windows offline filesystem hacking tool for Linux☆97Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆43Updated 2 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 11 months ago
- ☆25Updated 2 years ago
- Steganography Reverse Shell☆11Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year