ahhh / jammerLinks
This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to attack strings, and crash the scanner.
☆24Updated 10 years ago
Alternatives and similar repositories for jammer
Users that are interested in jammer are comparing it to the libraries listed below
Sorting:
- async web crawler☆26Updated 11 years ago
 - For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 11 years ago
 - Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
 - Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
 - Password cracking utility☆53Updated 4 years ago
 - Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆37Updated 10 years ago
 - Popping boxes with Nmap☆18Updated 13 years ago
 - NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
 - Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
 - Scripts and tools for ISM hacking☆16Updated 7 years ago
 - Wireless discovery and exploitation framework written in Python☆18Updated 14 years ago
 - Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
 - Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
 - Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
 - Wireless Attacks in Python (Based on Blog Series)☆93Updated 11 years ago
 - use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 10 years ago
 - Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
 - (◍•﹏•) - Hi, I'm Eve☆21Updated 7 years ago
 - Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Updated 9 years ago
 - Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
 - Shodan.io Command Line Interface☆44Updated 4 years ago
 - Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
 - Port scanning and domain utility.☆30Updated 8 years ago
 - Multi source CVE/exploit parser.☆28Updated 8 years ago
 - A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
 - Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Updated 11 years ago
 - µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
 - WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆31Updated 10 years ago
 - Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
 - SIP hacking tools and scripts☆23Updated 4 years ago