Offensives network security framework for Wireless and MiTM style hacking
☆61Oct 9, 2017Updated 8 years ago
Alternatives and similar repositories for n4p
Users that are interested in n4p are comparing it to the libraries listed below
Sorting:
- Reverse engineering MiLight remote-controlled lightbulbs☆13May 13, 2016Updated 9 years ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- stuff from my ToorCon 2015 talk☆14Oct 27, 2015Updated 10 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 10 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- A small application to allow Unitrunker to control SDR Console VFO frequencies☆15Jul 19, 2015Updated 10 years ago
- Webshell Jumping Edition☆30May 9, 2017Updated 8 years ago
- Hackbright lesson for using python sockets to create a simple chat server☆22Jul 16, 2022Updated 3 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- moduled sniffer TCP/UDP Proxy for man-in-the-middle attack☆16Aug 8, 2018Updated 7 years ago
- Program to check the best decoder options for dsdplus☆18Feb 28, 2017Updated 9 years ago
- Wireless Security Testing v1.0☆12Jan 6, 2018Updated 8 years ago
- Install beef-xss from github☆18Jul 10, 2017Updated 8 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84May 9, 2014Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Shellcode Of Death☆43Aug 31, 2013Updated 12 years ago
- This repository contains some bettercap transparent proxy example modules.☆280Feb 27, 2018Updated 8 years ago
- Windows PowerShell SDK for Box API v2☆22Apr 11, 2023Updated 2 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆21Feb 27, 2016Updated 10 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago