A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.
☆123Mar 18, 2023Updated 2 years ago
Alternatives and similar repositories for dBmonster
Users that are interested in dBmonster are comparing it to the libraries listed below
Sorting:
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25May 30, 2022Updated 3 years ago
- A WLAN red team framework.☆156Feb 9, 2026Updated 3 weeks ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- Collecting, processing and presenting information about WiFi access points and their geolocation. A versatile wardriving command center.☆15Feb 7, 2026Updated 3 weeks ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Mar 4, 2023Updated 3 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- ☆132Jan 25, 2023Updated 3 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆21Feb 9, 2026Updated 3 weeks ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- Tools for optimizing and handling the SSID pool for the WiFi Pineapple Mark VII.☆21Sep 1, 2022Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- A repo containing different tools compiled specifically for the Hak5 WiFi Pineapple MK6 and MK7.☆288Aug 1, 2025Updated 7 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- ReFleX - Deep Image Recognition Bot☆24Oct 14, 2020Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Dec 22, 2021Updated 4 years ago
- Search WiFi geolocation data by BSSID and SSID on different public databases.☆1,210Dec 21, 2024Updated last year
- An application to test windows and linux shellcodes☆94Nov 6, 2024Updated last year
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆169Feb 4, 2023Updated 3 years ago
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated last week
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆28Nov 14, 2022Updated 3 years ago
- Using the ESP8266 module, scan and display existing Wi-Fi networks.☆12Mar 19, 2021Updated 4 years ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆12Jul 20, 2024Updated last year
- Track planes by ICAO, Type, Operator and Squawk and issue notifications on Mastodon, Discord, and Twitter☆13Jan 10, 2024Updated 2 years ago
- Rdio Scanner is an open source software that ingest and distribute audio files generated by various software-defined radio recorders. Its…☆33Apr 6, 2022Updated 3 years ago