cryptolok / DMCLinks
A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device
☆40Updated 5 years ago
Alternatives and similar repositories for DMC
Users that are interested in DMC are comparing it to the libraries listed below
Sorting:
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- Docker images for learning wifi hacking☆70Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆100Updated 2 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- Simple Karma Attack☆69Updated 5 years ago
- ☆47Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Rogue Access Point Detector☆37Updated last year
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Responder for Python3☆100Updated 6 years ago
- Get clients and access points.☆49Updated 6 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- ☆17Updated 5 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 10 months ago
- API testing tool written with Python☆56Updated 8 years ago