blackhillsinfosec / Wifi-Forge
WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities.
☆265Updated last week
Alternatives and similar repositories for Wifi-Forge:
Users that are interested in Wifi-Forge are comparing it to the libraries listed below
- This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.☆2Updated 3 weeks ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆138Updated last year
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆99Updated 7 months ago
- ☆16Updated 5 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- List of tools and resources for pentesting Microsoft Active Directory☆45Updated 3 weeks ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- Obsidian Templates for OSCP, CPTS, and Training labs☆83Updated last month
- Internal Network Penetration Test Playbook☆16Updated 2 years ago
- Windows Malware Investigation Scripts & Docs☆75Updated 4 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆138Updated last month
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆227Updated last week
- ☆57Updated 3 years ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆331Updated 3 weeks ago
- An automated NMAP python script☆46Updated last month
- Creation of a laboratory for malware analysis in AWS☆96Updated 2 years ago
- ☆49Updated last year
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- ☆30Updated last week
- ☆43Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆136Updated last month
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆228Updated last year
- Retired TrustedSec Capabilities☆246Updated 4 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆184Updated 9 months ago
- Create lab environment for Linux Command Line course☆45Updated 6 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆148Updated 2 years ago
- /dev/tty☆27Updated this week
- Tools for simulating threats☆183Updated last year
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆208Updated 3 months ago