An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
☆296Oct 30, 2024Updated last year
Alternatives and similar repositories for rogue
Users that are interested in rogue are comparing it to the libraries listed below
Sorting:
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,466Sep 22, 2024Updated last year
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Jun 19, 2024Updated last year
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆305Sep 7, 2022Updated 3 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Chameleon: A tool for evading Proxy categorisation☆514Nov 28, 2024Updated last year
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- locate and attack Lync/Skype for Business☆346Oct 1, 2024Updated last year
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆445Nov 30, 2023Updated 2 years ago
- NTLMv1 Multitool☆659Nov 30, 2025Updated 3 months ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,807Feb 23, 2026Updated last week
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Feb 3, 2025Updated last year
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,194Oct 24, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- network reconnaissance toolkit☆435Dec 17, 2018Updated 7 years ago