Telefonica / HomePWNLinks
HomePwn - Swiss Army Knife for Pentesting of IoT Devices
☆904Updated 2 years ago
Alternatives and similar repositories for HomePWN
Users that are interested in HomePWN are comparing it to the libraries listed below
Sorting:
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,317Updated 8 months ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,625Updated 6 months ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,724Updated 10 months ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,712Updated 7 months ago
- MSFvenom Payload Creator (MSFPC)☆1,265Updated 4 years ago
- caplets and proxy modules.☆502Updated 2 months ago
- An intelligence gathering tool for hacking Bluetooth☆808Updated 2 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆544Updated 5 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,310Updated 3 years ago
- Collection of Scripts for shodan searching stuff.☆1,103Updated 6 months ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,050Updated last year
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆904Updated last year
- Python antivirus evasion tool☆1,429Updated last year
- Tools, scripts and tips useful during Penetration Testing engagements.☆627Updated 4 months ago
- Red Team Tool Kit☆1,118Updated 2 years ago
- 🔎 shodansploit > v1.3.0☆534Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,739Updated 4 months ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆311Updated 10 months ago
- Find exploits in local and online databases instantly☆1,738Updated 3 years ago
- List of Bluetooth BR/EDR/LE security resources☆554Updated last year
- JackIt - Exploit Code for Mousejack☆849Updated 4 years ago
- Hacking Toolkit☆921Updated last year
- A Virtual environment for Pentesting IoT Devices☆427Updated last year
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆1,043Updated 7 months ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆393Updated last year
- 🔺 Red Team Hardware Toolkit 🔺☆327Updated 5 years ago
- [Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For e…☆472Updated 5 years ago
- Mass scan IPs for vulnerable services☆1,033Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆545Updated 4 years ago
- All MITM attacks in one place.☆979Updated 3 years ago