SySS-Research / LauschgeraetLinks
Gets in the way of your victim's traffic and out of yours
☆27Updated 6 years ago
Alternatives and similar repositories for Lauschgeraet
Users that are interested in Lauschgeraet are comparing it to the libraries listed below
Sorting:
- Rogue AP killer☆91Updated 8 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- Creates dictionaries based on Wikipedia titles☆63Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Updated last year
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- ☆57Updated 5 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- tools for analyzing strings from password lists☆58Updated 3 years ago
- ☆153Updated 2 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- Bash Bunny fun!☆53Updated 7 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Discover target social media profiles☆81Updated 3 years ago
- Android and iOS source for the Empire mobile app☆90Updated 6 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆101Updated 2 years ago
- Tool made to automate tasks of pentesting.☆165Updated 6 years ago
- Examine HTTP response headers for common security issues☆38Updated 3 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆216Updated 6 years ago