D3Ext / WEF
Wi-Fi Exploitation Framework
☆2,507Updated 6 months ago
Alternatives and similar repositories for WEF:
Users that are interested in WEF are comparing it to the libraries listed below
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆3,964Updated 2 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,177Updated 2 months ago
- Tools and Techniques for Red Team / Penetration Testing☆6,507Updated last week
- An XSS exploitation command-line interface and payload generator.☆1,348Updated 2 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,338Updated 4 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,274Updated 7 months ago
- All In One Web Recon☆2,392Updated 4 months ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,223Updated last year
- The Network Execution Tool☆3,701Updated this week
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information abo…☆1,513Updated 9 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,738Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆2,987Updated last month
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,416Updated 11 months ago
- Tools and Techniques for Blue Team / Incident Response☆3,025Updated this week
- A script that you can run in the background!☆2,822Updated 8 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,775Updated 3 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,261Updated 4 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆2,971Updated 2 weeks ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,668Updated last year
- The all-in-one browser extension for offensive security professionals 🛠☆6,013Updated 2 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,452Updated this week
- GitHub Data Analysis Framework.☆1,841Updated 9 months ago
- A collection of snippets of codes and commands to make your life easier!☆2,690Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,965Updated last week
- Powerful framework for rogue access point attack.☆2,105Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,111Updated 9 months ago
- Rockyou for web fuzzing☆2,740Updated last month
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,935Updated 3 weeks ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,644Updated 8 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,378Updated last year