arVahedi / Gl4dius
A very powerful tool for All kind of MITM attacks
☆14Updated last year
Alternatives and similar repositories for Gl4dius:
Users that are interested in Gl4dius are comparing it to the libraries listed below
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆31Updated 7 years ago
- Simple Karma Attack☆66Updated 4 years ago
- It is a Metasploit based botnet framework☆9Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆28Updated 6 months ago
- WebHook for Red Team☆24Updated 3 years ago
- wifi attacks suite☆59Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- Malduino compatible USB rubber ducky payloads☆14Updated 5 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆32Updated 8 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated 8 months ago
- A swiss army knife for pentesting Windows/Active Directory environments☆13Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆20Updated 10 years ago
- ☆19Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago
- Open source SDR LTE software suite☆19Updated 7 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆22Updated 2 years ago
- ☆12Updated 7 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 5 years ago
- Tutorial to create a bootable Kali USB drive with persistent storage.☆8Updated 7 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆12Updated 4 years ago
- simple script to pwn android phone with physical access☆23Updated 6 years ago