Cyb3r-Assassin / n4p
Offensives network security framework for Wireless and MiTM style hacking
☆60Updated 7 years ago
Alternatives and similar repositories for n4p:
Users that are interested in n4p are comparing it to the libraries listed below
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated last year
- WPS scan and pwn tool☆67Updated 5 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Bash script to install Honeypot projects ona Raspbian System☆27Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Useful pentesting scripts☆84Updated 2 weeks ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆49Updated 8 years ago
- Your last stop for password list generation needs!☆27Updated 9 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Scripts for Kali Linux☆17Updated 7 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆37Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 9 years ago
- ☆32Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Distributed wrapper around oclHashcat☆88Updated 4 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆67Updated 9 years ago