Telefonica / USBHiddenNetworksLinks
β33Updated 8 years ago
Alternatives and similar repositories for USBHiddenNetworks
Users that are interested in USBHiddenNetworks are comparing it to the libraries listed below
Sorting:
- analyze a web-based network traffic πΆ to detect central command and control serversβ80Updated 7 years ago
- USB Attack to Decrypt Wi-Fi Communicationsβ32Updated 10 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.β26Updated 8 years ago
- my little bucket to store the delusions of grandeur I write in python :Dβ30Updated 10 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Classβ95Updated 13 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdlineβ124Updated 10 years ago
- Python tools for interacting with a DarkComet Clientβ54Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.β43Updated 10 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.β44Updated 10 years ago
- Rogue AP killerβ90Updated 7 years ago
- tools for analyzing strings from password listsβ59Updated 3 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcodeβ72Updated 10 years ago
- Your last stop for password list generation needs!β27Updated 10 years ago
- Wi-Fi Scan Visualizer by Pentester Academyβ58Updated 10 years ago
- VirusTotal toolsβ92Updated 4 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!β106Updated 5 years ago
- Veil Catapult is no longer supportedβ76Updated 9 years ago
- Interactive remote PowerShell Payloadβ78Updated 9 years ago
- General tools and scripts i want to make public to the world.β46Updated 6 years ago
- Command line tool for scanning streams within office documents plus xor db attackβ126Updated 2 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC credsβ168Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidityβ76Updated 11 years ago
- Offensives network security framework for Wireless and MiTM style hackingβ61Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to loginβ148Updated 4 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modulesβ¦β57Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automaticallyβ25Updated 9 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasksβ56Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwordsβ46Updated 8 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct architβ¦β14Updated 10 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requestsβ55Updated 9 years ago