Telefonica / HomePWN
HomePwn - Swiss Army Knife for Pentesting of IoT Devices
β903Updated 2 years ago
Alternatives and similar repositories for HomePWN
Users that are interested in HomePWN are comparing it to the libraries listed below
Sorting:
- Bluetooth hacking toolsβ429Updated 2 years ago
- π shodansploit > v1.3.0β533Updated 2 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handlerβ1,181Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and moreβ1,710Updated 7 months ago
- An intelligence gathering tool for hacking Bluetoothβ802Updated 2 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.β624Updated 3 months ago
- MSFvenom Payload Creator (MSFPC)β1,261Updated 4 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilitiesβ598Updated 4 years ago
- Find exploits in local and online databases instantlyβ1,733Updated 3 years ago
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β543Updated 5 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilitiesβ310Updated 9 months ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy β¦β1,161Updated 5 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.β1,310Updated 3 years ago
- Collection of Scripts for shodan searching stuff.β1,101Updated 5 months ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)β375Updated 5 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.β2,305Updated 7 months ago
- caplets and proxy modules.β500Updated last month
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that β¦β900Updated last year
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direcβ¦β826Updated 2 years ago
- Undetectable Windows Payload Generationβ1,595Updated 2 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.β1,716Updated 9 months ago
- Hacking Toolkitβ920Updated last year
- A Virtual environment for Pentesting IoT Devicesβ427Updated last year
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sessβ¦β727Updated 2 years ago
- SensePost's modified hostapd for wifi attacks.β569Updated 9 months ago
- π― HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery π―β503Updated last year
- Hacking systems with the automation of PasteJacking attacks.β397Updated 7 months ago
- Red Team Tool Kitβ1,116Updated 2 years ago
- Bluetooth Honeypotβ255Updated 4 years ago
- Modern tactical exploitation toolkit.β848Updated 10 months ago