SigPloiter / SigPloit
SigPloit: Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP
☆135Updated 5 years ago
Alternatives and similar repositories for SigPloit:
Users that are interested in SigPloit are comparing it to the libraries listed below
- SS7 MAP (pen-)testing toolkit. DISCONTINUED REPO, please use: https://github.com/0xc0decafe/ss7MAPer/☆466Updated 6 years ago
- SS7 Assessment Tool☆240Updated 2 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆642Updated last year
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,401Updated 6 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆855Updated 6 years ago
- SS7 tools and scripts☆206Updated 4 years ago
- Find exploits in local and online databases instantly☆1,691Updated 3 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆608Updated 2 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,177Updated 7 years ago
- MSFvenom Payload Creator (MSFPC)☆1,243Updated 3 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,133Updated 4 years ago
- The New Hacking Framework☆694Updated 3 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆992Updated 4 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,039Updated 2 years ago
- The famous WPA precomputed cracker, Migrated from Google.☆1,091Updated 8 months ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆428Updated 7 years ago
- A framework for wireless pentesting.☆1,203Updated 4 years ago
- Efficient and advanced man in the middle framework☆2,070Updated last year
- ☆973Updated 2 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆284Updated 2 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Updated 3 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,390Updated last year
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- Linux bash script automation for metasploit☆260Updated 5 years ago
- PhEmail is a python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering…☆335Updated 5 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆352Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆436Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆270Updated 7 years ago
- Undetectable Windows Payload Generation☆1,575Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆732Updated 4 years ago