A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.
☆168Jan 2, 2026Updated 2 months ago
Alternatives and similar repositories for Preferred-Network-List-Sniffer
Users that are interested in Preferred-Network-List-Sniffer are comparing it to the libraries listed below
Sorting:
- hauditor is a tool designed to analyze the security headers returned by a web page.☆176Jul 6, 2024Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Jul 15, 2024Updated last year
- PacketSpy☆156May 31, 2024Updated last year
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆113Jan 4, 2024Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆175Feb 29, 2024Updated 2 years ago
- ☆64Oct 17, 2025Updated 4 months ago
- ☆22Jul 15, 2023Updated 2 years ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- A fast and comprehensive tool for organizational network scanning☆134Apr 15, 2024Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Dec 15, 2023Updated 2 years ago
- PassBreaker☆66Apr 5, 2024Updated last year
- APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and …☆365Mar 28, 2025Updated 11 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144May 17, 2024Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- ☆568Mar 28, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- Tool designed for fetching, validating, and storing working proxies.☆259Nov 20, 2025Updated 3 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Oct 28, 2025Updated 4 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆555Jul 26, 2025Updated 7 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Red Kite, the Extensible Attack Surface Management tool.☆89Feb 8, 2026Updated 3 weeks ago
- Network Security Sniffer☆840Jan 2, 2026Updated 2 months ago
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- IOCs and detection script for COATHANGER malware☆55Feb 7, 2024Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago