cjcase / beaconleak
Covert data exfiltration and detection using 802.11 beacon stuffing
☆15Updated 5 years ago
Alternatives and similar repositories for beaconleak:
Users that are interested in beaconleak are comparing it to the libraries listed below
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆37Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- MS17-010☆12Updated 7 years ago
- Converts Half-WPA handshake to hashcat☆18Updated 6 years ago
- Open source SDR LTE software suite☆19Updated 7 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆14Updated 3 months ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆14Updated 4 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆50Updated 7 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆14Updated 8 months ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 5 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 6 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Wireshark Profiles for SS7, Diameter & GTP☆24Updated 2 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- Scripts related to offensiveosint.io☆21Updated 4 years ago
- Port Crawler Pythonized☆19Updated 2 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- A proving grounds for young and aspiring BBOT modules☆14Updated 2 years ago