cjcase / beaconleakLinks
Covert data exfiltration and detection using 802.11 beacon stuffing
☆15Updated 6 years ago
Alternatives and similar repositories for beaconleak
Users that are interested in beaconleak are comparing it to the libraries listed below
Sorting:
- Docker images for learning wifi hacking☆67Updated 6 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆25Updated 6 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆70Updated 8 months ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Analyses wifi probes (from mobile phones etc) and looks them up on wigle to provide possibly commonly visited locations of people near yo…☆29Updated 3 weeks ago
- A simple way to exfiltrate data using spotify API☆18Updated 3 weeks ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆18Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- Wireless Pentesting Device☆22Updated 4 years ago
- Converts Half-WPA handshake to hashcat☆18Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Hash cracking WebApp & Server for hashcat☆46Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- A simulation of the RFCTF KOTH game.☆10Updated 4 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆15Updated 3 weeks ago
- Haschcat Rules processor☆14Updated 2 years ago
- Sniffs sensitive data from interface or pcap☆15Updated 7 years ago
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Get clients and access points.☆49Updated 5 years ago
- Legba recipes.☆50Updated 10 months ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- Open source SDR LTE software suite☆19Updated 7 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆22Updated 3 weeks ago