FabioBaroni / WASLinks
Automatic USB drive malware scanning tool for the security-minded person
☆96Updated 9 years ago
Alternatives and similar repositories for WAS
Users that are interested in WAS are comparing it to the libraries listed below
Sorting:
- A USB phishing evaluation platform☆46Updated 10 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆92Updated 6 years ago
- Distrubición Linux para Osint☆56Updated 7 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆47Updated 10 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆66Updated 7 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆103Updated 8 years ago
- Code for Malware which spreads by injecting pendrive and sends IP address and MAC ID to Attackers Email☆72Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated 3 years ago
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆140Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆64Updated 10 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Updated 8 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- ☆13Updated 8 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆118Updated 6 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆103Updated 8 years ago
- Orb is a massive footprinting tool.☆51Updated 6 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Exploits USB HID to steal passwords saved in Google Chrome☆70Updated 8 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 7 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Updated 7 years ago
- ☆22Updated 9 years ago
- A curated list of awesome infosec resources.☆32Updated 10 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆55Updated last year
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆78Updated 7 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆91Updated 10 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Metasploit Framework☆29Updated 12 years ago