demmsec / bashbunny-payloadsLinks
Payloads for the Hak5 Bash Bunny
☆11Updated 8 years ago
Alternatives and similar repositories for bashbunny-payloads
Users that are interested in bashbunny-payloads are comparing it to the libraries listed below
Sorting:
- ☆63Updated 13 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Updated 9 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- Windows Offline Common Password Hash Checker☆29Updated 9 years ago
- Powershell Reverse Rubber Ducky☆57Updated 10 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Rogue AP killer☆92Updated 7 years ago
- ☆43Updated 11 years ago
- Veil Catapult is no longer supported☆75Updated 9 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆107Updated 11 years ago
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆126Updated 6 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 5 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 8 years ago
- A collection of tools for every PENTEST engagement☆12Updated 6 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Updated 9 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆60Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 11 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆147Updated 10 years ago
- tools for analyzing strings from password lists☆58Updated 3 years ago
- Useful pentesting scripts☆84Updated 10 months ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago