cjcase / beaconleak
Covert data exfiltration and detection using 802.11 beacon stuffing
☆15Updated 5 years ago
Alternatives and similar repositories for beaconleak:
Users that are interested in beaconleak are comparing it to the libraries listed below
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 6 years ago
- Generates several passwords based on one single word, like a company's name.☆25Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆68Updated last year
- Tools for attacking various MIFARE RFID cards☆14Updated 5 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆25Updated 6 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated last week
- Open source SDR LTE software suite☆19Updated 7 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Random files such as wordlists which maybe be useful for playing our game☆22Updated 6 months ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆17Updated 5 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Simple Script to query hash databases APIs☆16Updated 6 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Updated last year
- Converts Half-WPA handshake to hashcat☆18Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆28Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆10Updated 5 years ago
- Docker images for learning wifi hacking☆65Updated 6 years ago
- Scripts related to offensiveosint.io☆21Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Updated 4 years ago
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled ne…☆44Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated last year