SySS-Research / WireBugLinks
WireBug is a toolset for Voice-over-IP penetration testing
☆170Updated 3 years ago
Alternatives and similar repositories for WireBug
Users that are interested in WireBug are comparing it to the libraries listed below
Sorting:
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 6 months ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Automate Metasploit scanning and exploitation☆116Updated 4 months ago
- Unicode encoding attacks with machine learning☆97Updated 4 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆175Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆179Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- ☆53Updated 4 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- brute force SSH public-key authentication☆78Updated 6 months ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- Exploit Pack - Project☆72Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- The Nmap Scanner for Telco☆165Updated 7 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Build interactive map of cameras from Shodan☆23Updated 5 years ago
- Responder for Python3☆100Updated 6 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago