cjcase / beaconleak
Covert data exfiltration and detection using 802.11 beacon stuffing
☆15Updated 5 years ago
Alternatives and similar repositories for beaconleak:
Users that are interested in beaconleak are comparing it to the libraries listed below
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆14Updated 5 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 4 months ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- A simple way to exfiltrate data using spotify API☆18Updated 2 weeks ago
- Open source SDR LTE software suite☆19Updated 7 years ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 4 months ago
- Get clients and access points.☆49Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Haschcat Rules processor☆13Updated last year
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25Updated 2 years ago
- Rubber Ducky powered by NeoKey☆22Updated 9 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Converts Half-WPA handshake to hashcat☆18Updated 6 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Tool for capturing and mapping locations of SSIDs from wireless beacons and client requests☆23Updated 7 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆24Updated 2 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago