besimaltnok / WTS
Scenario-based WiFi Network Threat Simulation
☆9Updated 5 years ago
Alternatives and similar repositories for WTS:
Users that are interested in WTS are comparing it to the libraries listed below
- ☆55Updated 7 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Updated 6 years ago
- an ancient irc botnet☆12Updated 9 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆33Updated 3 years ago
- yet another solution for dining philosophers problem☆6Updated 9 years ago
- ☆15Updated 4 years ago
- ☆90Updated 2 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆27Updated 7 years ago
- ☆33Updated 3 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- a simple blackjack game supported by card counting and basic strategy☆10Updated 9 years ago
- Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis☆103Updated 8 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 8 years ago
- python version of "house party protocol" program☆25Updated 9 years ago
- wifiDOS with scapy☆16Updated 8 years ago
- CTF Tasks for HackMETU'16, with some attack vectors☆4Updated 8 years ago
- ☆11Updated 2 years ago
- ☆12Updated 5 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Updated 5 years ago
- Pythonic world - Python 3.x☆37Updated 4 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- Metasploit Framework with Viproy installed.☆36Updated 7 years ago
- Liberating dem proprietary APT implants☆21Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 7 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago