Automatiza la obtención del handshake para crakearlo después y tambn tiene la función de Dos
☆23Jul 10, 2023Updated 2 years ago
Alternatives and similar repositories for venom-wifi
Users that are interested in venom-wifi are comparing it to the libraries listed below
Sorting:
- Poderosas herramienta de phishing☆10Updated this week
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated last year
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆18Jul 21, 2024Updated last year
- 🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.☆29May 10, 2024Updated last year
- ☆19Jun 21, 2025Updated 8 months ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 9 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- This script is designed to analyze network traffic captured in a .pcap file using the pyshark library. // Este script está diseñado para …☆10Feb 8, 2025Updated last year
- This is a article that will teach you the basics of the go programming language in coordination to the article im doing on robust and sec…☆10Aug 15, 2022Updated 3 years ago
- Native Shellcode Injector Via Handle Hijacking & Pool Party.☆13Apr 11, 2024Updated last year
- Git Source Code Mirror☆16Apr 25, 2025Updated 10 months ago
- ☆14Jan 2, 2026Updated 2 months ago
- ☆12Jul 21, 2022Updated 3 years ago
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- XERXES la herramienta Ddos más potente.☆13May 7, 2022Updated 3 years ago
- In this project, I use OpenAI and the DALL-E model to create a web app that generates images from scratch based on the entered text.☆10Dec 12, 2022Updated 3 years ago
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many o…☆68Jan 5, 2021Updated 5 years ago
- Golang lib to interact with aircrack-ng (ABANDONNED)☆12Jul 12, 2019Updated 6 years ago
- A React Native app for students to sell properties they have no use for☆11Jun 25, 2022Updated 3 years ago
- create a custom iso of debian☆11May 18, 2022Updated 3 years ago
- Anonymous mail server for Termux☆14Apr 23, 2022Updated 3 years ago
- lightweight Golang ascii-art text generator☆10Mar 1, 2026Updated last week
- All Exploit List Made By Me☆17Apr 7, 2025Updated 11 months ago
- Working files for the Docker and Kubernetes course from Udemy taught by Stephen Grider (StephenGrider)☆13Jan 25, 2023Updated 3 years ago
- Python implementations of the Udemy course by Andrei Neagoie☆13Jul 8, 2020Updated 5 years ago
- Erebus is a payload generator written in Nim.☆16Jun 13, 2023Updated 2 years ago
- Simple PHP framework inspired by Laravel.☆10Apr 11, 2022Updated 3 years ago
- r3conwhale aims to develop a multifunctional recon chain for web applications, intelligently interpreting collected data, and optimizing …☆14Jul 3, 2024Updated last year
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- tests to catch some sloppy hv impls☆32Dec 17, 2025Updated 2 months ago
- Simple Python botnet.☆11Jul 8, 2022Updated 3 years ago
- Night falls in Tokyo☆11Jul 5, 2023Updated 2 years ago
- ►☆17May 19, 2011Updated 14 years ago
- Code from the Stephen Grider React Native course on Udemy at https://www.udemy.com/course/the-complete-react-native-and-redux-course☆12Updated this week
- Thanks to @d35ha☆13Aug 16, 2021Updated 4 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago