SySS-Research / WireBugLinks
WireBug is a toolset for Voice-over-IP penetration testing
☆174Updated 3 years ago
Alternatives and similar repositories for WireBug
Users that are interested in WireBug are comparing it to the libraries listed below
Sorting:
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 7 months ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Routopsy - Hacking Routers with Routers☆179Updated 4 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆178Updated 5 years ago
- Automate Metasploit scanning and exploitation☆117Updated 6 months ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Unicode encoding attacks with machine learning☆98Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆45Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- ☆53Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆133Updated last week
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 5 years ago
- brute force SSH public-key authentication☆77Updated 7 months ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆67Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆110Updated 5 years ago
- Low Interaction Mobile Honeypot☆96Updated 7 months ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Updated 6 years ago