cjcase / beaconleak
Covert data exfiltration and detection using 802.11 beacon stuffing
☆13Updated 5 years ago
Related projects: ⓘ
- Generates several passwords based on one single word, like a company's name.☆21Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆12Updated 2 years ago
- Tools for attacking various MIFARE RFID cards☆14Updated 5 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆30Updated 3 years ago
- Open source SDR LTE software suite☆17Updated 6 years ago
- Wireless Pentesting Device☆17Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆28Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆17Updated 2 weeks ago
- Converts Half-WPA handshake to hashcat☆16Updated 5 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- ☆11Updated this week
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆32Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- Simple Script to query hash databases APIs☆15Updated 5 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆15Updated last year
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Legba recipes.☆37Updated 3 weeks ago
- Miscellaneous tools for BloodHound☆17Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆11Updated 4 years ago
- Hashes of infamous malware☆24Updated last year
- ☆33Updated 6 years ago
- Port Crawler Pythonized☆19Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆66Updated 7 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- Scripts related to offensiveosint.io☆19Updated 4 years ago
- Haschcat Rules processor☆13Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 6 months ago
- A collection of open source and commercial tools that aid in red team operations.☆10Updated 5 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆12Updated 6 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago