bwinchester / seckc-encom-boardroom
📈 SecKC Honeypot dashboard
☆14Updated 7 years ago
Alternatives and similar repositories for seckc-encom-boardroom:
Users that are interested in seckc-encom-boardroom are comparing it to the libraries listed below
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Windows Remote Administration Tool that uses Discord as C2☆27Updated 2 years ago
- beside-ng module for the WiFi Pineapple☆14Updated 10 months ago
- WiFi Hacking Workflow with WiFi Pineapple Mark VII API☆81Updated last year
- Detect Stalkers with Wardriving, using Python☆36Updated last year
- LCD GUI for P4wnP1 ALOA☆19Updated last year
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆21Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 2 years ago
- Legba recipes.☆45Updated 6 months ago
- Find open databases - Powered by Binaryedge.io☆13Updated 5 years ago
- Automate your Wifi Pineapple Mk. 7 Workflow!☆55Updated 5 months ago
- Packet injection for wifi; simplified.☆37Updated 2 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆24Updated 3 years ago
- A super fast number dictionary generator (2M+ lines per second) to aid numeric dictionary-based attacks. This project uses multiprocessin…☆19Updated 3 years ago
- Pentesting Suite☆20Updated 8 months ago
- Wifi Pineapple Mk7 Evilportals☆37Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆9Updated 4 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- This repository is a mirror of https://git.openwrt.org/openwrt/openwrt.git It is for reference only and is not active for check-ins or fo…☆17Updated 3 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆33Updated 2 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆17Updated 4 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- A fast dictionary attack tool (700,000+ candidates per second), that attacks a supported hash with a user-defined dictionary file's candi…☆16Updated 3 years ago
- Tool to Disable User Lock☆26Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Deauther Project can be used to: Disconnect Devices from Networks, and Clone Networks☆30Updated 2 years ago
- ☆20Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago