bwinchester / seckc-encom-boardroomLinks
π SecKC Honeypot dashboard
β16Updated 7 years ago
Alternatives and similar repositories for seckc-encom-boardroom
Users that are interested in seckc-encom-boardroom are comparing it to the libraries listed below
Sorting:
- WiFi Hacking Workflow with WiFi Pineapple Mark VII APIβ84Updated last year
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β38Updated 3 years ago
- Automate your Wifi Pineapple Mk. 7 Workflow!β56Updated last year
- Awesome-Cellular-Hackingβ67Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.β108Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.β38Updated 2 years ago
- BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on pyβ¦β61Updated 9 years ago
- A USB phishing evaluation platformβ46Updated 9 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".β71Updated 10 months ago
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled neβ¦β47Updated 5 years ago
- Windows Remote Administration Tool that uses Discord as C2β30Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffingβ17Updated 6 years ago
- Find open databases - Powered by Binaryedge.ioβ14Updated 5 years ago
- Deauthalyzer is a script designed to monitor WiFi networks and detect deauthentication attacks. It utilizes packet sniffing and analysis β¦β55Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security β¦β71Updated last year
- Code for Malware which spreads by injecting pendrive and sends IP address and MAC ID to Attackers Emailβ71Updated 7 years ago
- Searching the TrashPanda OSINT bot API to check if your email/domain or password was leaked or notβ64Updated 4 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Seriesβ26Updated 4 years ago
- Automated Pentest Recon Scannerβ14Updated 7 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.β113Updated 2 years ago
- Plugins for airgeddonβ72Updated last week
- This repository is a mirror of https://git.openwrt.org/openwrt/openwrt.git It is for reference only and is not active for check-ins or foβ¦β20Updated 4 years ago
- Packet injection for wifi; simplified.β37Updated 2 years ago
- beside-ng module for the WiFi Pineappleβ15Updated last year
- β26Updated 2 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securitβ¦β105Updated 2 years ago
- Exploits USB HID to steal passwords saved in Google Chromeβ68Updated 8 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phoneβ29Updated 2 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blogβ28Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound mannerβ32Updated 3 years ago