catalyst256 / WatcherLinks
Maltego with a twist of wireless
☆26Updated 11 years ago
Alternatives and similar repositories for Watcher
Users that are interested in Watcher are comparing it to the libraries listed below
Sorting:
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 10 years ago
- Maltego Local Transforms for Facebook☆75Updated 8 years ago
- Password cracking utility☆54Updated 4 years ago
- Simple security surveillance script for linux distributions.☆59Updated 9 years ago
- WPS scan and pwn tool☆70Updated 6 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 11 years ago
- Useful pentesting scripts☆86Updated last year
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 5 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 9 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Updated 10 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- ☆63Updated 10 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Updated 7 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 12 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 9 years ago
- Easy Window domain access☆51Updated 11 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆39Updated 10 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Updated 8 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Updated 10 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago