curiozity / patitohunterLinks
☆12Updated 9 years ago
Alternatives and similar repositories for patitohunter
Users that are interested in patitohunter are comparing it to the libraries listed below
Sorting:
- Snort_rules detection bad actors.☆28Updated 9 months ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Repository for the KEYVILBOARD modules☆39Updated 2 years ago
- Rogue Access Point Detector☆36Updated 9 months ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- Simple Wi-Fi Keylogger with multiple layout support.☆27Updated 5 years ago
- Tool to automate the whole process of environment in android audits☆14Updated 6 years ago
- PoC for extracting office files into PDF file metadata☆10Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆84Updated 7 years ago
- Malicious Link Blog☆25Updated last year
- SDK-SMS-Stack☆29Updated 2 years ago
- Build your own Bad USB Stick for pentesting with wifi and dip switches☆44Updated 8 years ago
- ☆18Updated last year
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 7 years ago
- MS17-010☆12Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- Going through http://hacking-printers.net/☆37Updated 8 years ago
- wireless client identification☆18Updated 10 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- The New Hacking Framework☆18Updated 8 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆21Updated 7 years ago
- ☆37Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- ☆47Updated 9 years ago