dhondta / dronesploit
Drone pentesting framework console
☆1,478Updated last month
Alternatives and similar repositories for dronesploit:
Users that are interested in dronesploit are comparing it to the libraries listed below
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆890Updated 2 years ago
- Devkit for building Metasploit-like consoles☆244Updated 6 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,231Updated 3 months ago
- Powerful framework for rogue access point attack.☆2,037Updated last year
- Mass scan IPs for vulnerable services☆1,029Updated 2 years ago
- Awesome-Cellular-Hacking☆2,994Updated 2 months ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆535Updated 4 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,249Updated 8 months ago
- This program show you IMSI numbers of cellphones around you.☆3,265Updated 3 weeks ago
- An intelligence gathering tool for hacking Bluetooth☆774Updated last year
- The Offensive Manual Web Application Penetration Testing Framework.☆1,791Updated last year
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆882Updated last year
- Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.☆519Updated 2 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,560Updated last month
- The official Python library for Shodan☆2,542Updated 5 months ago
- Image Payload Creating/Injecting tools☆1,210Updated last year
- Find open databases - Powered by Binaryedge.io☆1,318Updated 4 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,069Updated this week
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,334Updated 9 months ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆988Updated 4 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess …☆715Updated 2 years ago
- Basics on commands/tools/info on how to assess the security of mobile applications☆1,516Updated last year
- Fake Windows logon screen to steal passwords☆1,306Updated 4 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,373Updated 2 years ago
- Wi-Fi Exploitation Framework☆2,447Updated 4 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,038Updated last year
- Information gathering tool - OSINT☆1,239Updated 3 years ago
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,124Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,684Updated 3 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,696Updated 2 months ago