wifi attacks suite
☆59Sep 24, 2020Updated 5 years ago
Alternatives and similar repositories for wifibang
Users that are interested in wifibang are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- A wrapper for Nmap to quickly run network scans☆147Sep 23, 2020Updated 5 years ago
- Automatic Wifi Cracker. Uses Airodump, Aircrack, Aireplay☆74Aug 19, 2017Updated 8 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Human Oriented SHell☆27Apr 1, 2024Updated last year
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated last week
- Web Application recon automation☆125Dec 18, 2020Updated 5 years ago
- Its like airgeddon but better!☆60Jul 27, 2024Updated last year
- Open Source Tool for automate WPS pin attacks based on a local database and/or 3wifi.stascorp.com (Javascript known algorithms pin genera…☆19Oct 17, 2018Updated 7 years ago
- iOS forensics utility☆13May 8, 2018Updated 7 years ago
- a collection of bash script and python to automate ZAP Security Tests☆11Oct 31, 2020Updated 5 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- Handshake cracker☆52May 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Jan 1, 2019Updated 7 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆140Oct 3, 2023Updated 2 years ago
- php tool for network scanning☆20May 7, 2015Updated 10 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Monitoring Registry and File Changes in Windows☆70Jan 14, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆10May 8, 2016Updated 9 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26May 8, 2020Updated 5 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Some scripts useful for red team activities☆13Jan 18, 2020Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Web-based check for Windows privesc vulnerabilities☆139May 14, 2023Updated 2 years ago