al1ce23 / NSA-PlaysetLinks
Mirror of the NSA Playset Project
☆42Updated 7 years ago
Alternatives and similar repositories for NSA-Playset
Users that are interested in NSA-Playset are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Source of swisskyrepo.github.io - Public☆26Updated 3 months ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆12Updated 5 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Malicious Link Blog☆25Updated 2 years ago
- The hacker technical cheat sheet☆42Updated 4 months ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆125Updated 8 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆72Updated 11 months ago
- ☆19Updated 8 months ago
- A collection of tools created for computer security research purposes.☆131Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆72Updated last year
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- Docker images for learning wifi hacking☆70Updated 7 years ago
- Unpacked tools of CQAcademy☆110Updated 6 years ago
- ransomware, made for a demo on ransomware awareness and how easy it is to do☆15Updated 3 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆12Updated 5 years ago
- ☆53Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆34Updated 8 years ago
- The Bluetooth penetration testing tool suite☆125Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- OSINT VM based on Open Source Intelligence Techniques 7th Edition☆67Updated 5 years ago
- An Instagram Open Source Intelligence Tool☆22Updated 6 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆84Updated 6 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆44Updated 2 years ago