InfamousSYN / rogueLinks
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
☆293Updated 7 months ago
Alternatives and similar repositories for rogue
Users that are interested in rogue are comparing it to the libraries listed below
Sorting:
- ☆224Updated last year
- WIreless Hacking Tools☆165Updated 11 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- Evil client portion of EAP relay attack☆202Updated last year
- PowerShell Empire mod to post-exploit the World!☆138Updated 6 years ago
- locate and attack Lync/Skype for Business☆338Updated 8 months ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆209Updated 7 years ago
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Remote Recon and Collection☆453Updated 7 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆366Updated 10 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- List of Awesome Offensive Tools written in GO☆202Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- A ton of helpful tools☆337Updated 3 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- Check for valid credentials across a network over SMB☆264Updated last year
- My collection of metasploit auxiliary post-modules☆191Updated 6 years ago
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- For all your network pentesting needs☆154Updated 11 months ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- Wavestone's web interface for password cracking with hashcat☆170Updated 3 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆254Updated 6 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆318Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 5 years ago
- Network Pivoting Toolkit☆448Updated last year
- an asynchronous target enumeration tool☆244Updated 2 years ago