CyberCX-STA / Virtual-Wireless-Lab
A wireless playground using mac80211 hwsim devices and docker containers.
☆9Updated last year
Alternatives and similar repositories for Virtual-Wireless-Lab:
Users that are interested in Virtual-Wireless-Lab are comparing it to the libraries listed below
- Classic Web shell upload techniques & Web RCE techniques☆29Updated 5 months ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Simple recon tool automates your recon process☆16Updated 2 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆33Updated last month
- Custom pentesting tools☆25Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated last month
- ☆25Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆23Updated last month
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆18Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- C2Matrix Automation☆11Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆35Updated last year
- Automated HTTP Request Repeating With Burp Suite☆37Updated 2 years ago
- ☆15Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Tactics, Techniques, and Procedures☆25Updated 3 months ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆31Updated 2 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago