cjcase / beaconleak
Covert data exfiltration and detection using 802.11 beacon stuffing
☆15Updated 5 years ago
Alternatives and similar repositories for beaconleak:
Users that are interested in beaconleak are comparing it to the libraries listed below
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆22Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆13Updated 2 months ago
- Open source SDR LTE software suite☆19Updated 7 years ago
- A simulation of the RFCTF KOTH game.☆10Updated 4 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆54Updated 4 years ago
- Get clients and access points.☆49Updated 5 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆18Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆18Updated last month
- Port Crawler Pythonized☆19Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Converts Half-WPA handshake to hashcat☆18Updated 6 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆16Updated 3 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Random files such as wordlists which maybe be useful for playing our game☆22Updated 8 months ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- ☆14Updated 6 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆19Updated 4 months ago
- ☆11Updated 4 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Simple Script to query hash databases APIs☆16Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 7 years ago