SySS-Research / WireBugLinks
WireBug is a toolset for Voice-over-IP penetration testing
☆174Updated 3 years ago
Alternatives and similar repositories for WireBug
Users that are interested in WireBug are comparing it to the libraries listed below
Sorting:
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆178Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆120Updated last year
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 7 months ago
- Unicode encoding attacks with machine learning☆98Updated 4 years ago
- Routopsy - Hacking Routers with Routers☆179Updated 4 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated 2 weeks ago
- ☆53Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- Automate Metasploit scanning and exploitation☆117Updated 6 months ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- Exploit Pack - Project☆73Updated 6 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- brute force SSH public-key authentication☆78Updated 8 months ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Updated 6 years ago
- Low Interaction Mobile Honeypot☆96Updated 7 months ago
- A shell script that mimics sudo and sends you back the password☆45Updated 3 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆68Updated 7 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Updated 3 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Various scripts and codes☆84Updated 4 years ago