al1ce23 / NSA-PlaysetLinks
Mirror of the NSA Playset Project
☆41Updated 7 years ago
Alternatives and similar repositories for NSA-Playset
Users that are interested in NSA-Playset are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- OSINT VM based on Open Source Intelligence Techniques 7th Edition☆67Updated 5 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- ☆19Updated 7 months ago
- Source of swisskyrepo.github.io - Public☆27Updated 3 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- Penetration Testing/Security Cheatsheets☆62Updated 9 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆11Updated 5 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- A tool to harvest credentials from leaked data dump☆76Updated 3 years ago
- ☆11Updated 2 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 3 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- A data breach parser written in python☆21Updated 6 years ago
- ☆22Updated 9 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆83Updated 5 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆62Updated 2 years ago
- Create Password lists for cracking lyrical passwords☆15Updated last year
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆124Updated 8 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆16Updated 4 years ago
- Random files such as wordlists which maybe be useful for playing our game☆23Updated 2 months ago
- A collection of tools created for computer security research purposes.☆132Updated 5 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- Collection of osint related links original posted by Tr1gger on raidforums.com which Tr1gger had copied from the @i_intelligence handbook☆21Updated 7 years ago