Crypt0s / AirReaderLinks
A Python-Based script designed to output stable and screen-scrapable lists of wireless networks
☆15Updated 11 years ago
Alternatives and similar repositories for AirReader
Users that are interested in AirReader are comparing it to the libraries listed below
Sorting:
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Various pentest scripts☆13Updated 11 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 8 years ago
- Educational Python penetration testing framework☆9Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- ☆17Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- a javascript keylogger included in a gif file☆38Updated 11 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Ruby Oracle Security Scanner☆16Updated 12 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago