SySS-Research / WireBugLinks
WireBug is a toolset for Voice-over-IP penetration testing
☆168Updated 3 years ago
Alternatives and similar repositories for WireBug
Users that are interested in WireBug are comparing it to the libraries listed below
Sorting:
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Kraker is a distributed password brute-force system that focused on easy use.☆82Updated 3 months ago
- ☆53Updated 4 years ago
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- Routopsy - Hacking Routers with Routers☆177Updated 4 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆175Updated 5 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆107Updated 6 years ago
- Automate Metasploit scanning and exploitation☆116Updated 2 months ago
- brute force SSH public-key authentication☆78Updated 3 months ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated last month
- Unpacked tools of CQAcademy☆110Updated 6 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆152Updated 3 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆63Updated 3 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆34Updated 2 months ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 6 years ago
- Exploit Pack - Project☆71Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆73Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- mosquito - Automating reconnaissance and brute force attacks☆132Updated 5 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Rogue Access Point Detector☆37Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Various scripts and codes☆85Updated 4 years ago