ahhh / Wifi_TrojansLinks
A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network via rouge access points.
☆40Updated 9 years ago
Alternatives and similar repositories for Wifi_Trojans
Users that are interested in Wifi_Trojans are comparing it to the libraries listed below
Sorting:
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Wi-Fi Backdoors☆39Updated 10 years ago
- Password cracking utility☆53Updated 4 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆37Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Massive arsenal of hacker tools...☆80Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- WPS scan and pwn tool☆70Updated 5 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 9 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 12 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55Updated 4 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆51Updated 4 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Optional plugins for MITMf☆16Updated 10 years ago