Tak31337 / medusa-guiLinks
A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui
☆40Updated 7 years ago
Alternatives and similar repositories for medusa-gui
Users that are interested in medusa-gui are comparing it to the libraries listed below
Sorting:
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 3 years ago
- cross-platform sqlmap GUI aimed to mobile devices☆49Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Dependencies for Veil 3☆18Updated 8 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 4 years ago
- A Python Script that prepairs and installs a Raspberry Pi compatiable distro to an SD Card☆15Updated 12 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 5 months ago
- Scripts used for phishing campaigns☆14Updated 10 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- ☆19Updated 10 years ago
- Test Android Application.☆19Updated 9 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Software exploitation training material☆15Updated 7 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- A web app scanner☆26Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago