curiozity / patitohunterLinks
☆12Updated 9 years ago
Alternatives and similar repositories for patitohunter
Users that are interested in patitohunter are comparing it to the libraries listed below
Sorting:
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- Rogue Access Point Detector☆37Updated last year
- Build your own Bad USB Stick for pentesting with wifi and dip switches☆44Updated 8 years ago
- Snort_rules detection bad actors.☆28Updated last year
- Repository for the KEYVILBOARD modules☆40Updated 3 years ago
- Tool to automate the whole process of environment in android audits☆14Updated 6 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- Docker images for learning wifi hacking☆70Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- Simple Wi-Fi Keylogger with multiple layout support.☆27Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- ☆47Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Simple Karma Attack☆69Updated 5 years ago
- hostapd-mana - build-files, and installation-files for OpenWRT☆33Updated 3 years ago
- Program to perform vulnerability analysis and automatically generate a report☆57Updated 3 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆26Updated 7 years ago
- ☆37Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Wi-Fi Covert Channel Chat demo application☆71Updated 8 years ago
- eZpublish vulnerability scanner☆10Updated 5 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago