ajackal / honey-hornetLinks
port scanner & login credential tester
☆15Updated 6 years ago
Alternatives and similar repositories for honey-hornet
Users that are interested in honey-hornet are comparing it to the libraries listed below
Sorting:
- Search Nmap and Metasploit scanning scripts.☆53Updated 8 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 4 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- pentest toolbox☆27Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- A tool for recover router password☆33Updated 7 years ago
- Get clients and access points.☆48Updated 6 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- Vulnerability Scanner☆11Updated 11 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆79Updated 7 years ago
- ☆28Updated 9 years ago
- Unofficial WhatCMS API package☆40Updated 4 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆78Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆47Updated 5 years ago
- A web spider for shodan.io without using the Developer API.☆32Updated 8 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago