curiozity / patitohunter
☆12Updated 9 years ago
Alternatives and similar repositories for patitohunter
Users that are interested in patitohunter are comparing it to the libraries listed below
Sorting:
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆50Updated 7 years ago
- Snort_rules detection bad actors.☆28Updated 8 months ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- ☆18Updated last year
- Repository for the KEYVILBOARD modules☆39Updated 2 years ago
- Simple Wi-Fi Keylogger with multiple layout support.☆27Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Build your own Bad USB Stick for pentesting with wifi and dip switches☆44Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- ☆47Updated 9 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Rogue Access Point Detector☆36Updated 8 months ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆20Updated 7 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆25Updated 7 years ago
- hostapd-mana - build-files, and installation-files for OpenWRT☆33Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- ☆46Updated 5 years ago
- A collection of Burp Suite extensions☆30Updated 8 years ago
- ☆24Updated 9 years ago
- MS17-010☆12Updated 7 years ago
- Malicious Link Blog☆25Updated last year
- ☆25Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago