CyberCX-STA / Virtual-Wireless-LabLinks
A wireless playground using mac80211 hwsim devices and docker containers.
☆10Updated 2 years ago
Alternatives and similar repositories for Virtual-Wireless-Lab
Users that are interested in Virtual-Wireless-Lab are comparing it to the libraries listed below
Sorting:
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- SMTP Open Relay Exploitation☆16Updated 5 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆50Updated 8 months ago
- Automate Auxiliary Module in Metasploit☆17Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Updated last year
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- Cloud Exploit Framework☆113Updated 3 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- ☆15Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆66Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 5 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Updated last year
- ☆29Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- ☆30Updated 2 years ago