90N45-d3v / dBmonsterView external linksLinks
A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.
β121Mar 18, 2023Updated 2 years ago
Alternatives and similar repositories for dBmonster
Users that are interested in dBmonster are comparing it to the libraries listed below
Sorting:
- Network sniffing automation with Bettercap as rogue AP or as client in your networkβ25May 30, 2022Updated 3 years ago
- π Help find Trojan Source vulnerability in code π . Useful for code review in project with multiple collaborators (CI/CD)β47Dec 6, 2023Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.β19Jul 1, 2023Updated 2 years ago
- Command and Control Frameworkβ13Mar 23, 2024Updated last year
- keep watching new bug bounty (vulnerability) postings.β13Apr 7, 2024Updated last year
- A WLAN red team framework.β155Updated this week
- ReconPal: Leveraging NLP for Infosecβ57May 23, 2022Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)β53Mar 28, 2018Updated 7 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of β¦β76Nov 19, 2024Updated last year
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication seβ¦β26Jul 18, 2022Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Aug 4, 2021Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β65Oct 18, 2022Updated 3 years ago
- AWS Security Toolβ30Jan 1, 2024Updated 2 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineeringβ240Jul 3, 2024Updated last year
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.β68Mar 4, 2023Updated 2 years ago
- Bash script for CTF automating basic enumerationβ42Mar 1, 2022Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.β119Jul 6, 2024Updated last year
- Burp Suite extension for extracting metadata from filesβ20Dec 29, 2020Updated 5 years ago
- β133Jan 25, 2023Updated 3 years ago
- A fast, simple, and powerful open-source utility tool for generating strong, unique, and random passwords. The Password Generator supportβ¦β21Feb 7, 2026Updated last week
- MacroExploit use in excel sheetβ20Jun 12, 2023Updated 2 years ago
- A Hacking and Pentesting Tool for Windowsβ20Jul 17, 2025Updated 6 months ago
- Tools for optimizing and handling the SSID pool for the WiFi Pineapple Mark VII.β21Sep 1, 2022Updated 3 years ago
- Shodan Monitoring integration for TheHive.β130Dec 12, 2024Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR relβ¦β29Jun 27, 2022Updated 3 years ago
- A repo containing different tools compiled specifically for the Hak5 WiFi Pineapple MK6 and MK7.β287Aug 1, 2025Updated 6 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, β¦β35Dec 13, 2023Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architectureβ196Dec 22, 2021Updated 4 years ago
- Search WiFi geolocation data by BSSID and SSID on different public databases.β1,205Dec 21, 2024Updated last year
- An application to test windows and linux shellcodesβ95Nov 6, 2024Updated last year
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance frameworkβ169Feb 4, 2023Updated 3 years ago
- Unicode encoding attacks with machine learningβ98Nov 25, 2021Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.β68Nov 22, 2019Updated 6 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound mannerβ30Oct 28, 2025Updated 3 months ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.β28Nov 14, 2022Updated 3 years ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.β12Jul 20, 2024Updated last year
- Using the ESP8266 module, scan and display existing Wi-Fi networks.β12Mar 19, 2021Updated 4 years ago
- Scripts and Tips for Kali Linux Pi-Tail Editionβ11Dec 8, 2023Updated 2 years ago
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!β14Aug 29, 2023Updated 2 years ago